Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html
-
Size
139KB
-
MD5
f6dc1aaddd48ff45f57e2b1600002eeb
-
SHA1
efcfede857906a274c4531910cebc83401e93ee5
-
SHA256
b6e0b7ce290e254326d9bd8a48b5ec4b80068ba8f47bc067eda473be29da8183
-
SHA512
8cc9ad5191f4f898db11568d615e44483838f8853e256900a0db415efee0d3256d00accefc3a4ed3c85025660065a893824e14ff6210894f75facce1e585d7c0
-
SSDEEP
1536:Sy/NHwJUDlZbMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:Sy//IyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4728 msedge.exe 4728 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 4836 4728 msedge.exe 82 PID 4728 wrote to memory of 4836 4728 msedge.exe 82 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 2868 4728 msedge.exe 83 PID 4728 wrote to memory of 4884 4728 msedge.exe 84 PID 4728 wrote to memory of 4884 4728 msedge.exe 84 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85 PID 4728 wrote to memory of 1344 4728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7d1746f8,0x7fff7d174708,0x7fff7d1747182⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14171731059697659584,4473289639046853030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14171731059697659584,4473289639046853030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14171731059697659584,4473289639046853030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14171731059697659584,4473289639046853030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14171731059697659584,4473289639046853030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14171731059697659584,4473289639046853030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5913d2c3d0ff8b69db1933a136ef3d12b
SHA199801235e8896b60e99aa509c40d8f18759e30ce
SHA256eb8a2a9fe3a66f61e5016e9a86e56aea09f755bfe6ebd44c2e398e5a3076e38f
SHA51269377129245fc1c8d04e46718482a70c376cb20c2c8ade97e5a266ef55d6b6ff48b1b0861a8de12acc68f214ef8d3025e8c94ae271fc67adbbd86c64117b3c3c
-
Filesize
6KB
MD5e0eb5b26ecec4645340691ba082f6ece
SHA1d27b1ffa8cd158614215bc139999617d398526ea
SHA256d202226e0251feb83052248a7d44de6614827c0bdd4384eac02ff9f4827196e4
SHA5129bc6d5928222c0346a26a46794ed510ae23fadced22b99e7b8538f606f1453084be620862fc1ac6a3bdfaf22a530932658332cbce5fb51140c40a784913e3b68
-
Filesize
10KB
MD556fa5d7d463b4bd04b4dacc9da9afe5d
SHA1e755eec76e171d9f7f77b06d2c048dcc3fd48d54
SHA256397d26781eab38990cd6731ace276899a616f2016bfca2e606b1d7ed4b6c9de8
SHA5123e762bcdade8358f9eb7650194a51a6cd07ccc4b06aaafe7c5d8c231f1307944eeed7b48c85838ea86424520af79355d2a9161a1e2149c3c973134f74e321703