Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
fa33729ea27ee0c47f20ec2cc029dc38_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa33729ea27ee0c47f20ec2cc029dc38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa33729ea27ee0c47f20ec2cc029dc38_JaffaCakes118.html
-
Size
218KB
-
MD5
fa33729ea27ee0c47f20ec2cc029dc38
-
SHA1
217956511b88781cd861e8a29959c85fe26c8957
-
SHA256
ecb098c3aab12953a4005ddc20ffafa26e22d950ddd357a6c421b600b915c596
-
SHA512
d65a05b5a3bbba1503ca01a318c1f010518be6f414e67bc111112a732c0e300fbc124e2dd7e4bba0e605969b03671b0cc043caf18f2c92cf10b312c110cd1a16
-
SSDEEP
3072:S9+o2we2/L7udLXDUwyfkMY+BES09JXAnyrZalI+YQ:S9+3E/3uZXDUtsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4188 msedge.exe 4188 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4188 wrote to memory of 3096 4188 msedge.exe 82 PID 4188 wrote to memory of 3096 4188 msedge.exe 82 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 2656 4188 msedge.exe 83 PID 4188 wrote to memory of 4948 4188 msedge.exe 84 PID 4188 wrote to memory of 4948 4188 msedge.exe 84 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85 PID 4188 wrote to memory of 3732 4188 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa33729ea27ee0c47f20ec2cc029dc38_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcafda46f8,0x7ffcafda4708,0x7ffcafda47182⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4268043557861918178,414566908028860270,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,4268043557861918178,414566908028860270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,4268043557861918178,414566908028860270,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4268043557861918178,414566908028860270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4268043557861918178,414566908028860270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4268043557861918178,414566908028860270,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD5dfbcd4d5fd70ed0796664d1403ac2309
SHA1951965eaea8dda7cefe5a21d457b386a97357ae7
SHA2569f03a4ee8f8f1140913618b58db777cee4956376581afd6e471e2650b06d4837
SHA5128b837bbb9f14f371fe692e6fd51f931f9182313db0e627df627664646bb8e9e249c202013a5a9c94fc02c6ea0e9ffcb00ff5e0de6b1b4801ea7451001e383d3d
-
Filesize
5KB
MD5f032590dadbbfbf3a9d9fd20636943ff
SHA1c4131ad4c9e259509576a56a9c616e012c797d19
SHA256b400b1af50bf087c275f0ca77b398325d60a057bf53ee25c043934e40b3a7ecb
SHA512a264c67d3119bdbde5838f40e64d6b6bec5dbc7f2fba35c0b13ebb726a1adaf8b5bc3aed48a46bc96e07c56994d431e01e29d67bd5c6c28c6669861c2742a878
-
Filesize
10KB
MD530dcbdb413b6e86fcb7b8280a8b15015
SHA177e8eed706e1f37efb7c3574f965cb7d88b75d1d
SHA2561269d291891261bcece35336f153dac7c8811df4b34fe4199500712045816e49
SHA512328c4ce9e8d8792a61b5941fed9d160e39b71d47a7b0642e353ffafdf66ab91ccac9a86b4823b7aef32171ff6c1301ce0b52a13d4c8bbc493614dfab15c60cf0