Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
fb155044398a6da90023ef879d75df99_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb155044398a6da90023ef879d75df99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb155044398a6da90023ef879d75df99_JaffaCakes118.html
-
Size
214KB
-
MD5
fb155044398a6da90023ef879d75df99
-
SHA1
7a8dd21012e5dbcd9001d7a2804fdc833b6756a2
-
SHA256
b067abb6033e4ecc6029cb6bea0f9a5f3e35affebff7c5c6a30a8ccf523b8ad2
-
SHA512
001727351986b455c44fa69b042342ac4ecdd4e1421e9b7813468071db6a1bddce6205d8b72cdfe36e5b7c40e2bc705ef8d37e1a4f9a2d85015914001219fd31
-
SSDEEP
3072:CrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJqy:Kz9VxLY7iAVLTBQJlqy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 1060 msedge.exe 1060 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 3544 1060 msedge.exe 81 PID 1060 wrote to memory of 3544 1060 msedge.exe 81 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 2544 1060 msedge.exe 82 PID 1060 wrote to memory of 4328 1060 msedge.exe 83 PID 1060 wrote to memory of 4328 1060 msedge.exe 83 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84 PID 1060 wrote to memory of 2188 1060 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fb155044398a6da90023ef879d75df99_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9da7946f8,0x7ff9da794708,0x7ff9da7947182⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,7692455302569372685,153963127923641464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,7692455302569372685,153963127923641464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,7692455302569372685,153963127923641464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7692455302569372685,153963127923641464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7692455302569372685,153963127923641464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,7692455302569372685,153963127923641464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD56a7f8714f3a4875c44dda40be8300a3a
SHA193a395e09dd0a399b23dede4c908b3ed5238bf7c
SHA2565674ecad6c006008038a86812814c5120eaddaa0c58cff671dbe15979bb37ba9
SHA512daba169ffde46d8c8719ae71688ba0d3a031b32597d6b130f021af1e43d336d21ccfcb577a2eaa36bb53dfcab048aca0b18fa6ddf03aced05f86270f9f5b4f92
-
Filesize
6KB
MD5f82bf88c211a79ed651a46a3f6ccd89a
SHA1fe666bc4d295d3445e2dab4bde6d35d5a388efab
SHA256fbf9f84c60f8aa92e0b6ec353ea062967dd2815ab69214a3a9ee2b2fd40a0a9d
SHA512b6dfdb49b7082e0a3d661ee6d24e28fd4e0e9746339aae3ee158342e79cdfe98cc4ef2ddaea9a4ecf7583f7ef402a37aad60a0946154cc11cb88a1aa0d54f4d2
-
Filesize
6KB
MD517cadbf09b031e16de99506dd40e7c21
SHA140f925f14e7a9a74980255bf0440beebfd5ba9ca
SHA256d1163e8f9a6a1f03ddf1fbba404d2ee11b9f2180c03c45902f936d4f619691cd
SHA512bf01dcc81126fb8451a3a7b7baa52a5ef775df38a1de9f883e8a8b8e6336a2bc37d204df74b9a246bb00da5af310371daaac0a52c0981422ae448f46792f8628
-
Filesize
10KB
MD50cff97ff65cdcd024826eb325cfb3dd0
SHA1290b8fd6c50e64943b8dd468586682fcea553c10
SHA256dbaf372a0ee9c75a0acc69ab89e3601f5ed8545dd57145e724e3250e0c6cad42
SHA5120f085aed7e0739d7a0e3b35d5a571404825d26938195e70804beeb423f724ad51d0a0ff0b0af26de3cd4463ccc63b33dd02250eb56103a93e59b32c134beb02b