Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
faf98902ecf224740de0c0d277d4cdd7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faf98902ecf224740de0c0d277d4cdd7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faf98902ecf224740de0c0d277d4cdd7_JaffaCakes118.html
-
Size
118KB
-
MD5
faf98902ecf224740de0c0d277d4cdd7
-
SHA1
28a62169e7d78593649791d3c2e179126fc98c60
-
SHA256
e462e28eca272468e26e86bbcad7c4fb751412646134af191dc0af7f385fc8e6
-
SHA512
155fd3bab3db160cc13f6b3b480b4d9349bf3ee1bf1bc318421f5c99dc12675136fa6170f414cf9013c12ced4c4de7d58121183829a49b84c521a4c5ea20a9c3
-
SSDEEP
3072:lFVYyev78g8RPtmy4CfZoewKhKIn2VAK72r87:lbYyev78Ni5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 4848 msedge.exe 4848 msedge.exe 1828 identity_helper.exe 1828 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1792 4848 msedge.exe 82 PID 4848 wrote to memory of 1792 4848 msedge.exe 82 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 4788 4848 msedge.exe 83 PID 4848 wrote to memory of 1440 4848 msedge.exe 84 PID 4848 wrote to memory of 1440 4848 msedge.exe 84 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85 PID 4848 wrote to memory of 1840 4848 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\faf98902ecf224740de0c0d277d4cdd7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa591d46f8,0x7ffa591d4708,0x7ffa591d47182⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3228117926208866151,4670155690992367992,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
469B
MD5f2d1a421ab6c91023f1f7246a0cd13ee
SHA15f8da94b0581c283aefa02c206b121bf89a47b8d
SHA25690ef7d9975b8d777836bc1a959c9f984a4cb6248dad1dedc45fe3664c8ddd4d1
SHA5122706257bc2ce56fa5b93305a1b4e4919d24792039eddfc10b6c34bd214d00946bd9c8d69865331c133410f570576def9d2e1457ad34af9bb9a41666a419a7aff
-
Filesize
5KB
MD5e452df996c19b000e00bb0a44b3fce02
SHA139f3f0cde8861307824d113183cf699c4789c5bf
SHA256ad2b3d83a0a3aa6fb0b5757c296e02b1b59015a4e6f5e2888d866a956c95ce41
SHA512daa94cc49baf2459954e02e41866ae19f474f620334f76557c20835f92a3e8c9bf5a180cf13f8bba26ab7ba626cfed737a895f2b5a1a4574da16ed7355bb551f
-
Filesize
6KB
MD5a7a4b6cc243a8645fbf48a23e9d30e5f
SHA161cd97069e53d3d321b755e1320e181e92e622f8
SHA256ce64b85aa59e9337b0ec352feb4adea425eb46b39f85df1d5668aca197d8d269
SHA5125bc5dd521025754b21e166d027592ce3587c6c736005a8727071c2ab9a04adbefcb3929089dc95fd699e860a68d6c2980e4e2f8639a96d257c049544b865435c
-
Filesize
6KB
MD52af90bdac3f2b5d2c3e08f17d2dcb6bb
SHA1b1012089e7c8e015864399c9a40abb79a158a218
SHA256d69e080a9484ec7f9c4dac920a73d1f6f39644b926169918248ef4a2279befe7
SHA512dacee409d6e5ec6a8f19e9cf31d6831125b54146f44e0b31fdce015b0ca90ba1564d8e664df4e43fc6c13c67782cae21c994ef40c6debc180780a54e5733f69f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5179e2183782f7397e4a502e51eb4b021
SHA15f26d705d91510bc41bd41930703c9ebfd362e46
SHA2566e1e06d48f74352d29da458ff1df335f6e074c12ed98990aa67bfc5c3f0b0206
SHA51248318373c873409b70ee2cc4a9c0905fd51449842ebb42825d274012af13b4552193b686b0d231923d70f5f365bf80980e47a4ed061d399eea05bb58ea7fc316