Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html
-
Size
17KB
-
MD5
fa66b33d1749f9da2dfdea6d1e343491
-
SHA1
0ab9dcb337385b543a65c816d1d55bcaa0eba508
-
SHA256
ac96eb06f9b2f7f747c24d50ae0cf067867d51f688ea5b394d0105f1a1bca702
-
SHA512
fb0d1050c4926addd6b7e678e86fb0f02897eb4b543bef77b00eb59b88fb89b834c6899cef14be5c5fe08d28990141ede1cd7e7694ca4bd61b92cd60756e272a
-
SSDEEP
384:FatXbj9GIWAsqDGbTGPUasyXS0glRYJxyz8tC:2XbVWEUasmS0glaJkzZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 1544 msedge.exe 1544 msedge.exe 1316 identity_helper.exe 1316 identity_helper.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2456 1544 msedge.exe 82 PID 1544 wrote to memory of 2456 1544 msedge.exe 82 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2996 1544 msedge.exe 83 PID 1544 wrote to memory of 2724 1544 msedge.exe 84 PID 1544 wrote to memory of 2724 1544 msedge.exe 84 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85 PID 1544 wrote to memory of 4932 1544 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5c8c46f8,0x7ffe5c8c4708,0x7ffe5c8c47182⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1972 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1764,18193040729732408562,495910689042839253,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1134de2b-3dab-4f3c-a213-1276a28815b4.tmp
Filesize6KB
MD5a2b251406e72ffac8b93fd8435689ef4
SHA1bab5baf88f0581036ba81deba2d3ec898eeac225
SHA2561b33747c11909ffed2eb21e639ed140d1919906ebe2a6fa1d31ccd4d5223ef1a
SHA5128f84173943096af7582f6e28c65513a449f003cbfdc1ad90212154d3184052a4397099eef0d49247f162d4aa9cee74bfd6edfbfaff564649080712cc623ddc03
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5e0bbde70a2e34473cccdaca75cd45005
SHA19351d81d3331ae2aaa8b85e38f6a233de6ae3d4b
SHA25635c67a26e62e78ef79d63ed74f640a951affedafbc54a2d18c6ddad10dbb5dfa
SHA512369db53246ff1014e4ae4344007d86710b109c26147aaf33c134117da27c7641f212d97a709d64620dc45874b0c525dac78de7536448e82f5fed12ab198d7556
-
Filesize
1KB
MD5222e9963e1cd517e7356b352bad736b0
SHA18ff21237f5c01006dcb45658afaf3afec3fc9f91
SHA256d917e8fa00d5298f581745ca19d2b31d724d50bea438cc26049e9a43c6fe6f22
SHA512817fcb0fe94f9175cd93ab9eeb3e2d555e352b8aa2d0bbfb2b41c0f4ce4d77ba0e9fecb9fa432ed493968eb22e59eae91c0e22885fa5d3faf06d8f2d55eeedb9
-
Filesize
5KB
MD562458e06e3e9a058bf7eb3b57342f2a4
SHA1c44659e62af825806af46cd2b596bf74c051bdad
SHA25663fb131ad9c9c27e2495cb45d1caf4fc30bd37bbabbb39e47c8a831a8dcfbb18
SHA512747a396ee6a3a981692367fd6255c2e83d8c5049a40d9513a9e51399a2ac92a37168a1b2edc1a8da10c83175bfc108f47d191adfdb8c265ea8d4166a0078b93d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5136d1895e097b570c581caf7ce248b6c
SHA15bb5b02bbcb3cb42e38dea1c6799c843bf79add1
SHA2563c2248d98965381ac7e01b174a5441fe17489eea20a194f42eaaf9fee22f8e60
SHA512720661c660fee6b93e217c814fb54dc0c9fc88aef9a6a0ed69282f71638248ee1dd6ef7fb0e9d19f14a8cd2b6f7a1488bc35e324c79f257195527622289c9c77