Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
f979d98c73fae2f134d2d3ef1983c13c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f979d98c73fae2f134d2d3ef1983c13c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
f979d98c73fae2f134d2d3ef1983c13c_JaffaCakes118.html
-
Size
139KB
-
MD5
f979d98c73fae2f134d2d3ef1983c13c
-
SHA1
fb7d10d1c53acd16ed5481ef6bcfe42cf73246e3
-
SHA256
75cade26fbd26c47de31fa33ae2509caa318fa2965d47af8b9abb760f6dca1d4
-
SHA512
deecc17afb0fe4d4431859ea0edba807b38e4df51290eccd35f6bd579bae3218b6aa831c73824f8502b57980dadd89158a673abfbd7528058e891477d63a15bd
-
SSDEEP
1536:SufoOVMZ5lupyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:Su/VMQpyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 1632 msedge.exe 1632 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 4352 1632 msedge.exe 85 PID 1632 wrote to memory of 4352 1632 msedge.exe 85 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4640 1632 msedge.exe 86 PID 1632 wrote to memory of 4820 1632 msedge.exe 87 PID 1632 wrote to memory of 4820 1632 msedge.exe 87 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88 PID 1632 wrote to memory of 516 1632 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f979d98c73fae2f134d2d3ef1983c13c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9b3f46f8,0x7ffe9b3f4708,0x7ffe9b3f47182⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2558591813280421452,6177049730029424111,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2558591813280421452,6177049730029424111,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2558591813280421452,6177049730029424111,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2558591813280421452,6177049730029424111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2558591813280421452,6177049730029424111,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2558591813280421452,6177049730029424111,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db1ed3bbcaa8e96c29a0b57e72bf0319
SHA19bc11860837a2bcdd048613ba8dd76d6d77d32d9
SHA2567c7db5dde536599fd7ffd4dee8e03ca0f6680e662022869057b09a4635b9b87c
SHA512eb7375877e9b51ebcf8cfc62cf822fdce3fdce837fbbd00d4d54c52c4f67bd82408e4809e1c92f32e9f3edc9e6726910f752fbeaf14704745688b0239405e6c8
-
Filesize
152B
MD5b4b5eaf7edd9d5391ddfdb694e0cd888
SHA1d1f92fbd238c4d5fb6861a83153893568d514586
SHA2561d5fc1e6da67b60df30ee83dd11359ec3dbe0c4bdddff2f2f862fa9c4619d903
SHA5121b62d5740572b1c17dadcb83d9e0017d6a8ff94cc64bc024cc47fa92a8180f7c2d18bef79ddf5cac8a9a97ecefd8461b06665e522acb0c5857dac1a2838fc048
-
Filesize
5KB
MD57e69909c97c6c5d0fc882b6c7ca58ce7
SHA1830b226be800b83ecaac69851d90f010c35706c2
SHA2566cf788fc208f062758b1f0ce476d9fb63441dac561ff50033e4373e04e17928b
SHA512580d8c19d4f7f896a7f82bb5752498319f8648c284091fcc756463989075b55f54c3db322a550118bbf34cd361e7e6749760c357b343bb2921da86ebfb8a851a
-
Filesize
5KB
MD57a2d60d8b647993dbddcd8f3f5a2d3ae
SHA105d1305c5a4e5874ca178f8c7f3d98264df342df
SHA2567f067a13f0d4100b5258132ec520d3dc04224921298ab54f39bcb8aa9dd3d813
SHA5127d439bf18ef848a1b4aa7a46b008dbe92b539f78af4e5e72404552d2dd609f4c5d5d9614d15112a4e713732eb28a324fa52ab1232e6f1c5dc604129fac4585ea
-
Filesize
24KB
MD5941ea4c983b3cf877ce6e1aab38f2794
SHA1c4fcce581d0660a0c96d0579aedb528a8168233c
SHA2563d4479f291d239eec609801437c1962e41e19c53a3eadd2f95342167fa7ad342
SHA512f47836cc619ea50f24d3804a697bb562781e812a65285959d7dbce53db8945cbbab2f9b8290ba2bd9925f620858918ddc676c082cdadae8444a9751d642a381b
-
Filesize
9KB
MD51070ec628fdf454355c3e70eee66a553
SHA1ca21acd550bfbf2d39f0c3fdfa4aedcc7557006e
SHA256867d6a7552a7c53e7357473e0e8d3115f9d0ce019994fd80b32708336b074bb8
SHA512272b6b54ef62e6d4bb29ad78a6506c18ee6fa1f3969028f718eb2eb9c57070d6ecc2d5bbc6b889decc927900a4771a2201183797b65e09904a030e1257a79c2f