Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
f9ae7baeb000a7e34216dca1aadf457d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9ae7baeb000a7e34216dca1aadf457d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9ae7baeb000a7e34216dca1aadf457d_JaffaCakes118.html
-
Size
19KB
-
MD5
f9ae7baeb000a7e34216dca1aadf457d
-
SHA1
8366c22fce2f1e3a6e75f5e73f64cb2c46c9e873
-
SHA256
ad4b2174efb6dca3ff30fce0c9f718db96e382009d45ea5971f431cc99ef5b18
-
SHA512
b53fdfbd6f7270f029de9b53b0235f4a678fa28b4f9f438df7c6ecad8c25a410147e335693b6e20256474c2fbdf09279c8a22b6f160a9f7f83b92d9d5c2ab6a9
-
SSDEEP
192:SIlS+1SsxR2H6DvkvOtXyAdT5ltgBHGA1poNS/l3vPmqlHog5o52X9MU6M:SI3xRS64G8GJ8poN2tmqZnXr6M
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 228 msedge.exe 228 msedge.exe 3108 msedge.exe 3108 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3108 wrote to memory of 3272 3108 msedge.exe 82 PID 3108 wrote to memory of 3272 3108 msedge.exe 82 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 4668 3108 msedge.exe 83 PID 3108 wrote to memory of 228 3108 msedge.exe 84 PID 3108 wrote to memory of 228 3108 msedge.exe 84 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85 PID 3108 wrote to memory of 4952 3108 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9ae7baeb000a7e34216dca1aadf457d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,15867986903102897835,18005907694969737688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,15867986903102897835,18005907694969737688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,15867986903102897835,18005907694969737688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15867986903102897835,18005907694969737688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15867986903102897835,18005907694969737688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,15867986903102897835,18005907694969737688,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD57a04525a8b7e1b23afa82a09863e9ede
SHA1d61b9baa79359bd63394bc54c66fbb53d868626e
SHA2562db42e8ca659017de71d2a47809fc4eac6f56202cfd90c6b8ea04de18fca31c2
SHA512285a1128a48639e0bf93aaad95dcb9db31e8498a5a74dd134578e343a61886c9fe9eedc697c5c3bf0ba2a6a6e7208d75bae580b2f48cdebc722ddf0e9d197d27
-
Filesize
6KB
MD536264841f6463c96d186a19dcaad3bc4
SHA10736a83281cc292920161d0a807f6168538d2b0c
SHA2561c3556c7a1367db1778e06fc37591263f6a1647a22f04d57130a146b11a4ff4c
SHA51281b6d9f4285c6fbb511ab06d7891dcbb6c401e57ce035558542b8939660a4ae8250c08ac4f2c48fe3492786dcd3971fe3dc1951074f246fa0622cc398137b638
-
Filesize
10KB
MD5d382b22d99f04687a8223e8dd69032ee
SHA1e2aa3cc318eef71e56940277624cb113f29e03ac
SHA25626833624f5693c54e844c220a0050528f16b0b9ec6e44938cdd8caca205052c4
SHA5125ba17ef669b980915b766eb7ab0d1dfe9953ebd3d64e5aa0856a1eeb56da412517eddfecab5a8e2690ed086af7e9b6c5726404f605dc50ab022f4ebc019e7eee