Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
f9ffef4f845cf6014cd22f71b9311770_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9ffef4f845cf6014cd22f71b9311770_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
f9ffef4f845cf6014cd22f71b9311770_JaffaCakes118.html
-
Size
48KB
-
MD5
f9ffef4f845cf6014cd22f71b9311770
-
SHA1
9a3bdd5bb95cb89c4866d6cc76cd330cb5de904f
-
SHA256
83eb7c133307e29ccec731de40cb2409924dfb4cf29b57a4504ff7f2e7006187
-
SHA512
57eddc9169c59d4073279d36558e0fce03d5a3c9db60261315cb77c7fadac5f86e21a2de45e19b4b6eb4fbcded6a94edead4a8af10b5204985492e82bb1fc475
-
SSDEEP
384:fRJ3m6/WlHG5AboKo6qoDDqB+eUUbHOA2sWoCx8QOdR+IQgU70UrURcL:f+HG5m2AMHa1xgU70UrURO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 4780 msedge.exe 4780 msedge.exe 3348 identity_helper.exe 3348 identity_helper.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 3580 4780 msedge.exe 86 PID 4780 wrote to memory of 3580 4780 msedge.exe 86 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1876 4780 msedge.exe 87 PID 4780 wrote to memory of 1584 4780 msedge.exe 88 PID 4780 wrote to memory of 1584 4780 msedge.exe 88 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89 PID 4780 wrote to memory of 2568 4780 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9ffef4f845cf6014cd22f71b9311770_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9546046f8,0x7ff954604708,0x7ff9546047182⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5428133559032738430,10061423022360232908,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\82833410-9368-4989-9617-84a9627c1a24.tmp
Filesize183B
MD5b85a556d6422c3a15ceed3ac9ce55ead
SHA1d3e1b4adf1d5011e39436db068a35e242eb0a3e5
SHA2562a7b2cc07019133adb8de662c792e0e909ef10b15a753872f9f84a77881bdad5
SHA512b19587168a93e699691a373dd438be6cb3394f4d398a89abeb2bb8e7686c62aff6ba61e1fc56ed6226016888c95400deab122f9ff27d37d8ed8a351b78e73437
-
Filesize
5KB
MD522c11637f02871b2d999ae3e967e6596
SHA111dabc4006e6dded78efc50415d8b13fa24e5298
SHA256f6088338e6fe8612ab32db1de295655930dcb3316341e2cabd360084a464544c
SHA51273e5cba9cecdbdadfbc5e3e57df2c975b6499420c532587d6aab15c6ca0a1041540fbc5151ace29501afc7128738176ba61005f0e990187b784e5d07c0d43020
-
Filesize
6KB
MD50265ad85349ae6c36199d576906b264b
SHA16d90b5bf2182cf8d63cc4ce3d297128b51d14986
SHA256e5c467d3e8e07bbb0fc33f4ec6f189347a25dec068dfe59ce08ba06a2d5b3b02
SHA512bc73c4910c9081fae5a7b7fa314a1667c46deda6b6f300de53edcd7ffc6f620d5b0b2edecf7998fbddfc63aa006f3bf572c63c4d32be92ff0cf61c947888b906
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD523b726a1ff0e32464a213a4823dbc476
SHA16fa4d9a1a85976f3e7a87b41f3e16c18954bf81b
SHA256fc0b7cc05a2a95d3705ce128908561121eb9eee144038c3c2eafe0141ab636b9
SHA51278180024eb31fc9db7e4a69173fe0aab7c1ca4f1114e4ad7a1db67cc092d8960e055bcc3655c2f0b32b9dbdac51b7f9f38ee7f974bdbecf8570699a73815e3dc