Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
faaf22d316ec602b67ea9b909062a1c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faaf22d316ec602b67ea9b909062a1c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faaf22d316ec602b67ea9b909062a1c2_JaffaCakes118.html
-
Size
204B
-
MD5
faaf22d316ec602b67ea9b909062a1c2
-
SHA1
b75e7262b40802c3ac54f57d05bb8ac2d67be212
-
SHA256
a6e0dd2be84c0627d0d03324570924ec3ca34b864c7ddb3bb7fdd3ec1629383e
-
SHA512
fa3a502310af36740b1460efd72e55d752ec3b2607255983d09fa1ca3b0a48be4045c24399c285ce8bce76a94f9d863523db748eb84809e1145117db8a33b902
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 2320 msedge.exe 2320 msedge.exe 3236 identity_helper.exe 3236 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2672 2320 msedge.exe 84 PID 2320 wrote to memory of 2672 2320 msedge.exe 84 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1652 2320 msedge.exe 85 PID 2320 wrote to memory of 1292 2320 msedge.exe 86 PID 2320 wrote to memory of 1292 2320 msedge.exe 86 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87 PID 2320 wrote to memory of 3460 2320 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\faaf22d316ec602b67ea9b909062a1c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd582646f8,0x7ffd58264708,0x7ffd582647182⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,8313987956186008867,15628629286471333089,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD59c3b477514e17ebe4f523579c941d87b
SHA12b30a4a444c795b70b412d3bcd0e5b727e389f87
SHA256125023354b9400fbf47da251854207d7c8baab5e8798fdcff617da271b058dc9
SHA512807766af9a0673435a6f854444fdf44f09e364e7dc113a171fb3d0ace61bea357acb946f63a629519df89a2744bc65e577292f389cd96c7c8be041f784f0f05e
-
Filesize
6KB
MD5844260b7dacde9e3347c77bf1c7514da
SHA1a288e7cace943b4c7c25aa24ff374aa06b261a4a
SHA2569bbf9b7f1275b7e5794973ddce98e4a746ddcd0283f7d3502215995dbcfc74ca
SHA5127cda85334429283926b70ee5fb29748ab467d7c9c18878040efaa5dad50309af23ca53cf3df9b1f9d1519b187b316e4396797c3d12365f8caf57b4b5211aa072
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50d7023d03f38f432b5e216bf8373e374
SHA1fe9f5615699eeb7be4804dd0f392cfdc29b4c6ec
SHA256c2055f83aac0091b6a4d46a4d45d4682a9359a23bc55f7eded5564ceae240284
SHA51207fc0a442f8890f8cf5fa328fae071977e7dc7220abb92c9a03b0a0ad789ab48a342720e343c0cf8a4281acc7027fee694bc353fef69b3d55ff2ee21351e2f1f