Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
fa3169ab4592cea1835f07c278bad051_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa3169ab4592cea1835f07c278bad051_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa3169ab4592cea1835f07c278bad051_JaffaCakes118.html
-
Size
218KB
-
MD5
fa3169ab4592cea1835f07c278bad051
-
SHA1
c7218b2472ee81d7207f69af0d0f47905e89ec84
-
SHA256
43c32d639a1ad88803c56470e27a0b3036061a15b630a40e3531e9a117ab8d00
-
SHA512
e75a24404f5215b3677b9e5dc5d131c1b726a0ed66ffa94e656ff263172c478daeacf0ef7ba9f8ac173a2eec43eb77e3d386a5bfbd8a43369c7b77377234de54
-
SSDEEP
3072:SiGsPEUEPGmkyfkMY+BES09JXAnyrZalI+YQ:SiGdrVpsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3516 msedge.exe 3516 msedge.exe 1944 msedge.exe 1944 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 4364 1944 msedge.exe 82 PID 1944 wrote to memory of 4364 1944 msedge.exe 82 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 2172 1944 msedge.exe 83 PID 1944 wrote to memory of 3516 1944 msedge.exe 84 PID 1944 wrote to memory of 3516 1944 msedge.exe 84 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85 PID 1944 wrote to memory of 2152 1944 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa3169ab4592cea1835f07c278bad051_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeebe946f8,0x7ffeebe94708,0x7ffeebe947182⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17301912806592759348,7795341106818138374,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17301912806592759348,7795341106818138374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17301912806592759348,7795341106818138374,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17301912806592759348,7795341106818138374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17301912806592759348,7795341106818138374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17301912806592759348,7795341106818138374,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD570ae4282d4d78fc5337bef374780d919
SHA19641a888edf3c3fedd7f9bfd229a0f3db823a1ac
SHA25661aa382d55f4a8009e67e98f7e53380b186fa4e82eaf99f42eb50d1b6ae764f3
SHA512185d99ba2970cf4e326bd93628c3240e350da67d11eaa48583fbf54f0a95965be452dc012703eb717a1b6a41fa802a0fee26460c75679af4df2b1c0dab4d29f7
-
Filesize
6KB
MD565c07a2dec0ff1a859170783febfeb41
SHA142f1acdc5a238cd3863043655ecd85fa5ee5b0c7
SHA25697b11e423fd12ab8817e2db068d0f0ab7ccb37d22bcc80b841e04ef8bbf3fef4
SHA512c229247aaec75ae79f5a91f56d222d88fe188462321a8ae7fea0f688cf287c7e11a1f53d045a3c11788a628677d9e12adc9a68da3cfe44372dfd30d81aa4b8aa
-
Filesize
10KB
MD554102e96e56eb0e67aa103f65df3e8fc
SHA1446e4025c13ff010ad487fcf8947886baeabf65d
SHA256e8632bd218d7e81b7622444a899381be4d4dcb9c2211b655dde36e84841b5ba7
SHA512876c465581bd644a3a28ddd1d71e37e20371e8c95bd5339aeebecb8bed22742d295aa2fbcb8aee9d50924e4ae231be833170398822b4ff8d094d64dbaa9fbf82