Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 08:44
Static task
static1
Behavioral task
behavioral1
Sample
fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html
-
Size
12KB
-
MD5
fa165f2fd434a6daf0d5dcbdb08a31d7
-
SHA1
165ed391ba13365c5019d164ecd462c9112191f6
-
SHA256
5a988cb3b54421bc35f1879252fd87dc171d368984e8fcbbefdb9c5c3615f12f
-
SHA512
bb83857adc22064d2aaa5bc7924821f66e6625e5ac9b236b5e723bf1942125f3c07362f94c062c1ea710bd1129faec4b762feda9c5a77bb9bdd3443a6a978686
-
SSDEEP
384:s1lIcvVKjlm/gclBmZWn6vdmd08LOXguLZ:0gvERExLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 3620 msedge.exe 3620 msedge.exe 4144 identity_helper.exe 4144 identity_helper.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4460 3620 msedge.exe 83 PID 3620 wrote to memory of 4460 3620 msedge.exe 83 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 4304 3620 msedge.exe 84 PID 3620 wrote to memory of 2700 3620 msedge.exe 85 PID 3620 wrote to memory of 2700 3620 msedge.exe 85 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86 PID 3620 wrote to memory of 2040 3620 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9feca46f8,0x7ff9feca4708,0x7ff9feca47182⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2644 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,18301511087899076729,15927293695322646955,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5524 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5fe0736671b5d87685ecfe00a6992e927
SHA14fd6ed8d9d189c4f1c6f870db97135ab2efc6fa0
SHA256d007e4afa5dcf8770e9410e006e794e9b1db608719028491309b3725c4149a55
SHA5124d8cd437923e14c70aa7fa1b8f93796e65f465277836a71295b876c4cf5ce8a352e82f5722210375251d8b66f47b3b8838798aabc28e56b75d2790090baa6438
-
Filesize
6KB
MD5b06c2cbf029cb6f63e8df8619063d1aa
SHA12a3e6721bec6eef4c226e4e9c0eb3f7516c37529
SHA256b29ef02d04c79a24b1c9d8e845c6b39d188277c857640f112551d886d2717a19
SHA512ec1408052c89f32f18547f2d68cd05c90b37328b3123c82d913a19f62fc854776811b36edce55b7de8dc54eee6adcfb524c285d29d1f67f775396f5d4db878ad
-
Filesize
5KB
MD540f0f35cf8b53c70cc9221b9a71c2b58
SHA1af8c177732683c9c8c9a0fc7416cd149672c621f
SHA256438c2ba596c33aa2817c817c221691912a73a57194e64a052a3a54c3082cc92f
SHA51287b83ac07988adb459728debfdfe14729bcdbde08f549b6696119232c2893edea201ecb830f40f84c55749b1ac41a137aa4ccfd33fcfbf4efb677e47b3e8528e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e5227d4549da4b9187256566cd62a2bb
SHA1167655928d112b86be50534995d2c2c81f8551d8
SHA2563f3536d523ff5d1f327a5221d9d913a38235075b42b10a71dcca0e2826973b4c
SHA51267dfae74cf522bb72e5df99517d3102d878d3d38f7981598df0921b71379c076bd5ba27d0f03b26cf0811be27ad2d380be9c219d327416a139f0f98c66859e40