Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
f9e977e9cb238ce94b7d7a4b72c9ca46_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9e977e9cb238ce94b7d7a4b72c9ca46_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9e977e9cb238ce94b7d7a4b72c9ca46_JaffaCakes118.html
-
Size
9KB
-
MD5
f9e977e9cb238ce94b7d7a4b72c9ca46
-
SHA1
8d305555ab2a689ca7cb3e4bc57310c40ce6b598
-
SHA256
b75a0ebb5087354c6194eb574bf74cd2aca88f3ba1003c3ad8db19e84577d1bb
-
SHA512
7dc793dcbce153bb0067cf3aaeaeab9f3bacdc2e94841272bfd0f0cd4251b94f98691869c8f923fcd39a6ce30024b754d008ad5555f422315fb487e1039d4c5c
-
SSDEEP
96:uzVs+ux7piLLY1k9o84d12ef7CSTUzGT/kPs8bpUlVHcEZ7ru7f:csz7piAYS/mhUPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 3060 msedge.exe 3060 msedge.exe 1444 identity_helper.exe 1444 identity_helper.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 5048 3060 msedge.exe 82 PID 3060 wrote to memory of 5048 3060 msedge.exe 82 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 1780 3060 msedge.exe 83 PID 3060 wrote to memory of 4804 3060 msedge.exe 84 PID 3060 wrote to memory of 4804 3060 msedge.exe 84 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85 PID 3060 wrote to memory of 636 3060 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9e977e9cb238ce94b7d7a4b72c9ca46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadbad46f8,0x7ffadbad4708,0x7ffadbad47182⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4054096672112581209,17000836455550265335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
6KB
MD5feb5916f49e601abd8aad789771c1a19
SHA197c7be2171fa5cee48272772dae0893deca7eedf
SHA25691cb18fe07307708e7f1e65eab230a399f42619ff0a714ddbbbccdc3a73088d7
SHA512810050ea66114e532bfad23108a32d45268e346c8f2067aee321998040db272b3c6b07b2f7030c92b6a6da186ad20db2696a5cf6a150c4b7ad7d8b4399633a26
-
Filesize
5KB
MD51861c61f0dd96428e2dde32232ea9198
SHA15907e2f1cba60a4d61475f6beb473f54677d7057
SHA2563f6bad3f20c0f4e4adec857d9d50f3a2a4aba7a301e754939d1be74a763383ad
SHA512aa6b018868ff889aa853adb90b61c22b47c60381f7f0da5f2968c2b06bbf7d44a51aca916828127b72c846e32beac904d3e505aa28b6db5c5d94b36df326ba7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e84eed2f758023bb86e2cc821e000c68
SHA1d0c252c31774fe87be424e88c7a949f782d4c611
SHA256d4c4615390a1a8d76be864cc9c5bff1a87f7e37ec6ea0dd843d3e63a37f23143
SHA512a4941708197d309cd94f1b9ab7d6791dbf59532e113f8610d677cdcb291b99d3a8e2b10fb21dc08f5e5262664bba6d9f8dc2920928473e9bc167ca1b5b3b1730