Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html
-
Size
177KB
-
MD5
fa2c205610571db8e85ee5fde178ed5a
-
SHA1
d39d01b4b70bf2b8f50999e1a017f3258c7cf3e8
-
SHA256
e5e005ea4dfafbf1bcda2344fba2ec9ea33579a6ac42f51cbc9d6590567e7f5c
-
SHA512
033417b1c5d1b4be062cd1426b2dc80600c7e324342fbcc4b80957de907ad24e869c00a339cfa0ca5914c0c94fa944a4b2c2a6e511ba18bfa398fd60c19264d6
-
SSDEEP
3072:fClN+Lzwg/7tI87xMWbiIfZ97nm6GOywvnm6OMZKMPWd/:ciW5M8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 428 msedge.exe 428 msedge.exe 2436 identity_helper.exe 2436 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 428 wrote to memory of 404 428 msedge.exe 82 PID 428 wrote to memory of 404 428 msedge.exe 82 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 4804 428 msedge.exe 83 PID 428 wrote to memory of 3892 428 msedge.exe 84 PID 428 wrote to memory of 3892 428 msedge.exe 84 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85 PID 428 wrote to memory of 2228 428 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28c346f8,0x7ffc28c34708,0x7ffc28c347182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,657149919876487122,9423502946011639121,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5548 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7576f94c-b8ed-44a5-b17f-f4b69abe4348.tmp
Filesize5KB
MD5aeb45d8fc5c9e60964e19769fbbf9489
SHA1fb248c3db408eadf5edd99cc330e439edb851701
SHA256627f8ab1e1be6aca1e3a91aee2bc1c8c946db12f442b39cd1d7a0c18e045a9dd
SHA512f29d6f8d4a64b4cfa449412d7e884265b39ef1329ec250fabca418ff9da11e9449977b3278d47079319d82a50fc8b20fe3613d5296ca857b020ea9fca2dcc98f
-
Filesize
251B
MD5bc51865ea4d10c86be5d4cdb0ea139cf
SHA12242ea3570c4a1f00d1d05dd86cd0efa2b480e48
SHA2565a43754aca5f151ff5210ace70f9c9c241b57cc13627492b7a41c1bf130bd301
SHA51241e02526b79748dd9600b68abc108db9983aa595132fdee11e27746f49280b6e5cf380a91c2c094a4089f2d00bd7964324e11502cd5027022e2a53dd426756c1
-
Filesize
6KB
MD5c1687126afaffa4e500c2367ebab691a
SHA1fa8187353a866568cc4e3b98cecc3f3c11a43326
SHA256767d285f8636222975926d98d2dd90e922d684a10d8076145ab824b215450d0a
SHA512d0abae11bfb6b81abc3443dd9ae1419080969eb70b80477055fab44b194ea0186e5de341e23dada7f918b04decf62212a139fe35376e11dd2ae2c15181cf8980
-
Filesize
6KB
MD545769a0082fb69db897808ee5e9ba2d6
SHA16a59faf72d74acf41d72784a2ba4246af2ea2270
SHA256364fbfd273991c190c92f5a8cb8479f3b05735c4bcdb9d77f8fdf2be45a00e0e
SHA512d8d5ce8fac007cdf6e94a61b753abe57e4df8335de662913394627886151ef7bf58cb687353b2c2f20842dc004456788c9360b38bc5f72212169547a0aaf404c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f121c5e349850e7340cd5a85a073d88e
SHA1300f2297f567bd012d866fe8289c874ca5f72572
SHA2564ec3d268bfdcb0022dc7439c3e6da0f967c493654698d977f0a1148c742c724a
SHA512c8a697cdb5b114825467502e3d828eee0001f9d8955af3281eaf1e859ff5caa110a7fe6c5b1c5e257d30cdd29a698227f2a027bb4e385101d8d0ee1b74d5a448