Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
faa769804399cc4a6ff96562f08131eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faa769804399cc4a6ff96562f08131eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faa769804399cc4a6ff96562f08131eb_JaffaCakes118.html
-
Size
361KB
-
MD5
faa769804399cc4a6ff96562f08131eb
-
SHA1
96b9224848a423a19c6b2add8a3f50165304100b
-
SHA256
efd65b3758beadc7fb48d4d527eee9ba13b46d786ecdeb655f17b72fac1abe95
-
SHA512
03d97917e49889ab17f5612e1b93735489232ab3a68f5e6c2358067bba99c000f3d33ef474774b7c51b3f67789ddd0d51e561c6520e63531e3172cd9753a1911
-
SSDEEP
3072:Lnu2RE0bl2/K/CRh6T8/Z/BQhpI5e7oQgwsRmt:3oQgwsRmt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 4464 msedge.exe 4464 msedge.exe 3204 identity_helper.exe 3204 identity_helper.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4940 4464 msedge.exe 82 PID 4464 wrote to memory of 4940 4464 msedge.exe 82 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 1052 4464 msedge.exe 83 PID 4464 wrote to memory of 3256 4464 msedge.exe 84 PID 4464 wrote to memory of 3256 4464 msedge.exe 84 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85 PID 4464 wrote to memory of 4076 4464 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\faa769804399cc4a6ff96562f08131eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff79846f8,0x7ffff7984708,0x7ffff79847182⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15946306114875221929,1662055723020843424,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
188B
MD506b053870aeafb9626a3b5811ccd994a
SHA1d88305e47ea47e234be3659546db33e5bfae8717
SHA256c3fdeb105b90eacca573ba56b3c14fa5a8690400884388cc0c789d20b9a4cd42
SHA512f2b890bd469f7f2cbeebe1e3aa1c6ae5aa01d73e21b60a55cff405ee4bc236ab8d1d494b555772b2ec1370f5b508b1aa6edbaf30024df01910e28b4c40b66627
-
Filesize
5KB
MD52668ab8f08466bfd6361eb6b095abc66
SHA15cb1424128b74a8b23dde15abd2a4f36144168d2
SHA2562a63d5b26e7b94ebfec89dcf4aa2aa4543d84244e8e7f35f4e0f1f91fa89ce75
SHA5128440ca6c8825301ad926846227409ec5118f261af78eb5eec0189453e81282a06c313357add9e1299b310334feb4daa00380eef4855ccdf085bde63c530ded7d
-
Filesize
6KB
MD5b0e7a0de71cee2637755de6245e07c4e
SHA13bb74ecb2715acf20138bb779a9fb7a0022c34e1
SHA256a1c474fedb6a9bdc3f8502669b9d173ab94787bf1f77007e326f28533b6318d8
SHA512ff406f45d96ac346087e89a1daf238903f2f7b9df601e32b356e8abbaaaf10efdf733f59648d70f7afcb594957c093e74927d579a979ee81038f1f575e16d084
-
Filesize
203B
MD5c1c90fb17859b65f806384d330450d31
SHA1f0280113d754bc91082e4307d93bd6be7d0a8a6e
SHA256657070e70d9c608117389ce62bcbeee91a74d89913da2c424799917824c80106
SHA51200d0cc238388fcef38aca114b21fbf55810a6f3df7e754f4ec836a984dd4be4eedb4e53c2cffd8fedf0edadc83202fc25f174a1f34caad94c318e4acd4ee62fb
-
Filesize
203B
MD58265a8dcf7dc3124d485f751bd280f1b
SHA1357b05302aeeed7b309813fc72700b28212bdb39
SHA2569befa2cf09d2489648fde5329378561f14d11f193e6084c36fc2506be8617558
SHA512182b7af479ebec4e65585a8021d918a895290041d7432891969da3f2c69cf8b23b25c5e64fde8a1e199483d9aa6d7bc63cf4cfb70ff46bed5375e6861d756e82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD547e1ab65600ad07819738703c148a45e
SHA16b38f133feb18d5dee5c26e0f3c9373f1649c3ca
SHA25684bcedf098df0619a006ca2f1eee3741f9013d39eff38d961f60a4a3cd644dbc
SHA512addd312f11fdd5640cecb7c8ddf0fa8fbf316a543af2044f06f2d5eda77fc764570693d03f8e1b169082ec6bc2887a7dc79343ac1370b587f1c905a73c6730a4