Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
f659fc7757c6af266950126175baae9b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f659fc7757c6af266950126175baae9b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f659fc7757c6af266950126175baae9b_JaffaCakes118.html
-
Size
35KB
-
MD5
f659fc7757c6af266950126175baae9b
-
SHA1
55129b5a6c9bbfc5ea72154cc08b6994c2dc2c83
-
SHA256
59ed35f98e36235615dddd14f16ec4ffbf39a029a9caae1265b2364ce11a9ccf
-
SHA512
98470d5f4cb3db033e4aeda29a74e73569a716af9ac43ad1184669e3568324ef077c4a73275c82f17f83fdad5df8726835d1d4ad655128424d2f830f71ecdea3
-
SSDEEP
384:hMxb0eBssdbWWGUjCNvxvRc98GWgehVa668:GxYeesJvr6vR88+e/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3236 1680 msedge.exe 82 PID 1680 wrote to memory of 3236 1680 msedge.exe 82 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 1568 1680 msedge.exe 83 PID 1680 wrote to memory of 3608 1680 msedge.exe 84 PID 1680 wrote to memory of 3608 1680 msedge.exe 84 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85 PID 1680 wrote to memory of 4036 1680 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f659fc7757c6af266950126175baae9b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2436944681969871950,10896962728635023892,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5da52b374bf0a4b25ec00ba5abe2c5603
SHA11b136d3d96f7dd48867c8568002b84b691c5026c
SHA25688a9b1e5ade64e1a42a9704eef852e9acdfa857f50308fcfb091f9ee8b2e181a
SHA5123a0b5c7ed1179005267cdb230549bb3b9ac18730008713cabebb67a65165446bf57e86e4692d8d9d45f8a473498e361b22af36fbec379c4ebc0e42f35a68179f
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
6KB
MD5f1533c24d6553532bc656d428a83532c
SHA15aacd0ce29284858ce6c2802e5513e2a19265f93
SHA25659156ef208acd3163bf642f79475a21382273479a8b5f2214f110522c4567a67
SHA512645a87ef9f820dba9b019d04ce1652360f869a4f88453a478224e38a9a6995aff12bd7aa4f97b81ca7b97ff4263ce7ca6a166036f6b53addcababbd005040e2a
-
Filesize
5KB
MD520b7e9b7806c7321e53945a97619b057
SHA12aba1168f46bd85790891a83ecf9b7da7060897b
SHA25619731dbf7b8dca24fe634da953ff9db7f57c512fdcae7352e405563656332486
SHA512b4ad040b1b2273b72f2af02cc672deaac405bca762fab740b97ed3ad91640d0b0cee1ef9a408a3dff0adfcd932e555497624c3fc2fafea8460e5ab7d15e9dd25
-
Filesize
6KB
MD5ee2bf01c4f7c2231eef505579f9c6c50
SHA101d2516d7a23ccd7266399d74deb4a2683539d02
SHA2569bee60bb424ecaf29335499db478b7e6ef8b968e2f6c15fdd771b59561760705
SHA512cc626e0f126800aa97158ebf47c3cb61c1640620773521ef2d55c2619567fea9c54378c270c343408c00d051e24a0c5882e281fc6525f7188d67171d33815525
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389