Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html
-
Size
18KB
-
MD5
f57289e18ce2a340ab3a6077bfc069c1
-
SHA1
32ee291cd2aece8767c34be35b7d35d6a5efbb3e
-
SHA256
6d738e7980d2a0f93374f3632278aa332b9ee83aa38dc80e756f3401aee0cd81
-
SHA512
90c110b6253eee2f14403a161e1815b6cc450adedfe076672cc4fb0671a4b9c14b6fa38b3015ce002bf780cad3e877c0068cb176567ddb3c3403fd243e4e7837
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIg4IzUnjBh4C82qDB8:SIMd0I5nvHtsv4RxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 2180 msedge.exe 2180 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2208 2180 msedge.exe 84 PID 2180 wrote to memory of 2208 2180 msedge.exe 84 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 2008 2180 msedge.exe 85 PID 2180 wrote to memory of 4008 2180 msedge.exe 86 PID 2180 wrote to memory of 4008 2180 msedge.exe 86 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87 PID 2180 wrote to memory of 4028 2180 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfbb046f8,0x7ffdfbb04708,0x7ffdfbb047182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14440986655737477321,11081083480242298346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14440986655737477321,11081083480242298346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14440986655737477321,11081083480242298346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14440986655737477321,11081083480242298346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14440986655737477321,11081083480242298346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14440986655737477321,11081083480242298346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\170b60af-bb89-468c-b5d9-2bc776865d1a.tmp
Filesize6KB
MD510494516270238ba36cf3637a58eccbd
SHA1175a61104727c8ce9e7d45396712b7690e614f1f
SHA2560647de4cb8cb2ac2ea59dc4deb4c6b3edf692b8121ab5ddaf586ee22a25f224c
SHA512bcd70226f9d26eb6384f67b30f86a35f98cbc6cd995cb16186925ac3f837abc5e31d564b05923f3aa90eefdb64e568d25a47e15e2fd8935389b9d092d4584d0b
-
Filesize
6KB
MD522e933595fc823a36780892e3605079a
SHA1f5d7ba2388b59c62a94c5c9eb1ffce7994e32586
SHA25647243a7a3c5083ea476831b77e1803e6af62c980cae4e8721082b08898ffda32
SHA512c773990d58a2df56598740be1ff0fc01f007f50c0a3183fab5c0f105b6dd811fb659da8bd0aa0c82a9d617faeab3d2ac2a7ab2e70d9c574a5e2ca74deacf3c7c
-
Filesize
6KB
MD5a8c2c75c3ffd635c38d634a3b201b4dc
SHA1811c3d23950232f5b86e5ccb4a4a725f324777e7
SHA256305acc2859aa81f550b275d565bdfcf7c29c53d91fb92839186c61af43a7db16
SHA512b9653da5beb7ab774e340c82dd7047c97e3b3fdb31286ffd3dd2fa3af033cba3115b6ba57650ae043f2feebe547705aea7a862eab909e0b3a22a980ee6ced94b
-
Filesize
10KB
MD58ccebd5c89c382f98f4cc8bd86f5a74c
SHA1e2aaca1fdb03626f20941df82bd02e41348ae5ca
SHA2562a693bafebc4499c78f19f9f125117567eced38b1f9cd0e348f3f6a37216e402
SHA5124cb1468bdbb92b30b8253e92eb14017a9bbbd86af3c99ee67c32ea032f47a33de4d129a1e731d2b57247127472705e1cce37d041037bdfeddc26894a7472737a