Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
f509ba3a8691edfa32fe48908d38a134_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f509ba3a8691edfa32fe48908d38a134_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f509ba3a8691edfa32fe48908d38a134_JaffaCakes118.html
-
Size
122KB
-
MD5
f509ba3a8691edfa32fe48908d38a134
-
SHA1
ddc9b9737d32f0f616866f0f8408787766aaf63c
-
SHA256
5cf26049e257921b6fda4bba530cf4b699cee85968909eb6d7dceb438144bc89
-
SHA512
daa8d4726fb081cee34e10af34525e873cebf1f0d383c763909bf54760614806d13d87ee002e4b7fab2589df905a026e072c83640336e98c7b502ce9e770dc5d
-
SSDEEP
1536:h73SDMoZnwIdEo2Bp6i3VhnnTs1OzvJZdU1:BSAoZwIV2/fVl9zvJs1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 3068 msedge.exe 3068 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4812 3068 msedge.exe 84 PID 3068 wrote to memory of 4812 3068 msedge.exe 84 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 4092 3068 msedge.exe 85 PID 3068 wrote to memory of 1336 3068 msedge.exe 86 PID 3068 wrote to memory of 1336 3068 msedge.exe 86 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87 PID 3068 wrote to memory of 2912 3068 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f509ba3a8691edfa32fe48908d38a134_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc201b46f8,0x7ffc201b4708,0x7ffc201b47182⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9640322081291878804,13803186340362485070,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3536 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7c778163-b485-44ac-bef6-43f69d31956f.tmp
Filesize6KB
MD5743a401db8327f34c91989a4e4cdd0fa
SHA1e8100cabc0562127cfabb0f19694d276c3138751
SHA256954c16129bcbe59bee0bd7b5cf30e6b2947346eab31b4643eeab58a77d92b12a
SHA512521835d9e7b0c5f78d62cd5f94dcf30ef73a09016c1cec7f6e4cd80488023ee43407eae3e933c8a9b906c76038314686008c259f5cb594a3c2486e41be7d0b33
-
Filesize
5KB
MD557c98dbbf58517c8e77b26b94bac24da
SHA1a09d3a79015fca00e27874058b9976a100abc8c8
SHA256737a29716f9da4c21ce1a9502e92fd6dede0c881639a23752bd876f6d9b0b036
SHA51267b77dbaa0efbe10c64b4464592e6697e4ee45b10e65e420ed4d325cff13d29a941382d09ca9ccab24c94fbc988f3955775350d3b5d0b9069b91b4facb70213e
-
Filesize
10KB
MD5d1e4a53dc366736f02758902c86e5079
SHA12c897ecc4224eb95db32c466ae2a766430c97b8e
SHA25679af759d12f7ee0e2339632399a7cd9a2055b283866ab921d033be454e9fbfd9
SHA5120839e384443691d4fd32b43babfcf4a6cd33ee25f6bd0ff5153f366bbc93b4b80d6731ca8b35df6244f3db25af692795da09622852f2a3859a07d6a12fd3bbf6