Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html
-
Size
105B
-
MD5
f9c998a7d1fa9f2dfec5fd5b4a4c1603
-
SHA1
ad473a733d8c0813d4bd7cfaf4c15b9185de5a2c
-
SHA256
f01f5f542ee702af0d9d0d6cf787c8f62460d7068a078baeab11ef000c6447c4
-
SHA512
c9010146bac7ccf5ce1596102d46045dac8de50ea1eac5f9b633c6bb52d33ec0d41b42c24496c44fe9ce26b27d70801ca9f945720b86bdf4ac21272acd06bc0a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 536 msedge.exe 536 msedge.exe 2180 msedge.exe 2180 msedge.exe 5116 identity_helper.exe 5116 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 8 2180 msedge.exe 82 PID 2180 wrote to memory of 8 2180 msedge.exe 82 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 4536 2180 msedge.exe 83 PID 2180 wrote to memory of 536 2180 msedge.exe 84 PID 2180 wrote to memory of 536 2180 msedge.exe 84 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85 PID 2180 wrote to memory of 2568 2180 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8e0d346f8,0x7ff8e0d34708,0x7ff8e0d347182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2740 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6883095972490739806,3326655638012826907,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5b4198f45b1c990568716c742d21e3c99
SHA127a04b8f4450d77d4edb89826fe7704fab60b263
SHA2564e423b43aeab115750a2b45cae47dd0f4778f7bfdb20608d36114ccbc5d3a001
SHA512df23636e398c4b19f0331b55d72c4bfdd7c830ccbba7edfc82a60ddef8720ad850ada0fdd32a76a9d6f93a5496a1b38d5cdcc465ca8395c659141f603ba5a525
-
Filesize
5KB
MD568d69be84fa946fdb2b9cd906e681486
SHA1ba99371d37dde834fd0142da2d7e51d9e4fda575
SHA256328c19ef3d9fc54aab02a9633df1b574752b2e6386d2d6ae0abb3dfc7cbdd1dc
SHA5125d6947a7f5980a48a88f43c9e135f07bbe0dbda648b49855ba2923e87e9de20531aa4483d006c224dbea156d0a8325cb7ac0583aeda345ef57429fc1774c0ba9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD578da670646b59ce667e9f0507b14137c
SHA18bc3010d1fc647fadc0a5d5645658c2ab1bd7ac7
SHA2565bdd69add6063e0fa7d722b00b5b85757907387b79a67f234a28154c81e9db5a
SHA5121bec14806b06f74f2986ec7b41d7a0316438ce3a9d87f15342fb8df8fc07cb0044ed1f34ab8b2e325991b6759fb2d7d3e436f8a7f4910031aff18282263c1608