Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
f669a2c8649271dc930ec8e3ed7def4d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f669a2c8649271dc930ec8e3ed7def4d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f669a2c8649271dc930ec8e3ed7def4d_JaffaCakes118.html
-
Size
46KB
-
MD5
f669a2c8649271dc930ec8e3ed7def4d
-
SHA1
330ed489444b06aa4a49df4c5b248069f9b655cf
-
SHA256
f8f508c5d038e92c3bd7e13f1fe7a1ffc9196143d0747f5a6f532fd977ad138a
-
SHA512
cb26fa8a0e66f115feb64042dd10f0db9d568f95d7d6f77c14e319cc761dd3e2802419ffbb635660ec29742d8a31d68fb5423d546a965c9a33353f6641f516d7
-
SSDEEP
768:BFW57PM1Nq4BrSjm2I3jrNo8uG2ufmNzxJO:BCPM1Nq4BrSjmTNovG2vtxc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 4896 msedge.exe 4896 msedge.exe 2384 identity_helper.exe 2384 identity_helper.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4964 4896 msedge.exe 82 PID 4896 wrote to memory of 4964 4896 msedge.exe 82 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 1408 4896 msedge.exe 83 PID 4896 wrote to memory of 3932 4896 msedge.exe 84 PID 4896 wrote to memory of 3932 4896 msedge.exe 84 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85 PID 4896 wrote to memory of 3828 4896 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f669a2c8649271dc930ec8e3ed7def4d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdffd46f8,0x7ffbdffd4708,0x7ffbdffd47182⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9608062671804279081,9924358391050180836,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5e544674dbc85b8ea310a4c4b2c45f3e2
SHA1c928a84b7a850d67caf78e426be4c5080446e3af
SHA2567938e23d61d51cdef65503624d44ab25ddefb4ff3e8f39427ddc4f17e3fcc96c
SHA512af4588250e804f6d82b7718da6c8ecd5963b47e1a7351c6705c635fea9572059ad937d3a5c4e52a2242a44658ec2bb09e82368f301745a374c9c1c33b8008cfe
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
551B
MD59f08517c5f84d1b1e2d0e22e23eb5246
SHA161838a5a0c0f8bf977cc01b221e55fb4c8ce6b23
SHA256afaee9619f65506f066e977e6bd001e9a3ef7f1e8c5ced7891b3bb945e45dc76
SHA5129cac6d442111f3eec98b134bd4de667fce663c8edf5521617363b2855716c89a3a3c0753aa158469444235def2ab0a6eb9069d5087870d94d108babd063bca72
-
Filesize
6KB
MD5c92288b749b8e3ba037aef0707bb7491
SHA19da3cdcf07eaafbe6093decca02a2cd1349b8303
SHA256acd0583d65c1bea2e60b79b0bfb5b0768292a8cebec65a2ae963f271c89630b5
SHA512871c86d11c696edacb5778b5222be122475292721d4a35ff20f7b770346736f1e20dfef2944295c949c3bbc2ce1d810d9a08e937c38f4df6a24c9c9ad4bae92a
-
Filesize
5KB
MD52f89b92c24ad906602b415f252649f3c
SHA1422736c7dfb195c1a8db4f74cfc43622f06672fe
SHA2562a21289dc5f64509ddf98364ceb61c5980973dc32046982e7d0ae2955323f658
SHA51219d8d3f07c251f5d1b82014d32c401cb52481ea61ed30a8f28c689232876abb4da945941d2cfd7523fd1a465c75dda2b241fa40aba930a50894a6eca7edf8b61
-
Filesize
6KB
MD5df0196e5cece1d2654c5163d917e7541
SHA1fe1d046a3cf74b809d65b7a4a20f8c911e86eb53
SHA2567c18a6655ca5ade1b98f04ea1844d1c3e86a6738db2dcf563596edff8768d30d
SHA512ef320381fe76f5be9d168ea99a35d3615429dc13e6051b9ea7c3e9204476a76c1d5657908fbb19683a38b189f38e96d197e8c2ad0e0a75755453b2d37c3819b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389