Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 15:27
Static task
static1
Behavioral task
behavioral1
Sample
faa865dd19a5bcfeb3a5e285149e355b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faa865dd19a5bcfeb3a5e285149e355b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faa865dd19a5bcfeb3a5e285149e355b_JaffaCakes118.html
-
Size
156KB
-
MD5
faa865dd19a5bcfeb3a5e285149e355b
-
SHA1
ae25bdd9de472a09bdf8dad4407fbbf58a105ba0
-
SHA256
9e4f8a4fe22d414d1f360567f9e9c22ff6306aa501c5611676668555ee0a2603
-
SHA512
27cfe91977de555664240c965c974041931065678609c1e81b983c3b9d66835589d58798f540bb076987d4ea5376f457264028411fee6aaf2a804ac2f5c358c7
-
SSDEEP
3072:7gvWDCq+vbo+eb1ZiIddsERjWArcNt8aNY5wj2ZN0uUp+EjN4rQ5CXr:7gvWD/ZiIdGERjWArcNt8aNY5wj2z03E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 876 msedge.exe 876 msedge.exe 1464 msedge.exe 1464 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1980 1464 msedge.exe 82 PID 1464 wrote to memory of 1980 1464 msedge.exe 82 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 4408 1464 msedge.exe 83 PID 1464 wrote to memory of 876 1464 msedge.exe 84 PID 1464 wrote to memory of 876 1464 msedge.exe 84 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85 PID 1464 wrote to memory of 1644 1464 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\faa865dd19a5bcfeb3a5e285149e355b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3b0a46f8,0x7fff3b0a4708,0x7fff3b0a47182⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10438360855850326916,6079894914679336274,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD50162956c8f2d34369d4ad4981badfe09
SHA1664849c5d9adc67ee8a50fbf104f3db3f22e8bcd
SHA256f05f1f04d4a62a7bb0cb5504ff32da5c7f4a604881116b2a888064e51236d5d8
SHA512e917514468d6858d5083fe55748c933800f0adb24cc4dfaaf071d9aca0693d1124699935ee8aa7736edcc90f5178548b50af3d0f38a9196971746f56b29bda30
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD569507320a48d489620ef8d83080cabd0
SHA15b78d2e1ddbf7d0fbbd234183bbfbd2a19863dda
SHA256a9968c73484ea0ac332d37c121d225b7f353eaa6199e90c820b62f5ca6cfcfad
SHA5122b8ba51585e38161c46a36ec748752d6c59585f314270cc9c7e2ff05aa1742ac59c9bcf5156b806ac2c4e7aa5582e14554bb48c43454072b5d95f634655d057c
-
Filesize
3KB
MD5357d1950376e30b21b3f218049f5eabc
SHA1e83c4d846b2c670de4d2d6b173521451442d953c
SHA256321551126f32c69b443d9e1c0939729325425721a71e2dfd66e6834c01be934f
SHA512e01260ad3737c7c58c588ccc07251cfb8c519aef6c93a1672a456b6ce9b331fa4f09257eb5b26d28b8834960c4a29aa886456d7e2bebb4de9cf75485148661f5
-
Filesize
7KB
MD5720610293b442a1fd5cd5c7ea4515cc7
SHA19e1285accd996d898503e3ea4796911561c5bd7b
SHA256c29c1a735ba9111d567f44f472d4dbea2c552b083f4d4ddf2042054a6d1febee
SHA5122cc0504a469d5891175b5d58b181fec91de2e3d2b90b79cfb72670d4fce85ffe10c1255fad833ac99549e1222c99389769b521844c7b25ff61024c5558723ffb
-
Filesize
5KB
MD5993c1c82a37ea0c986c2620c019bbe66
SHA168bbb1f7bbc44875cf7f3610df629a1de3d26ff9
SHA256fd345ff834683a5b4fd6dab65ff5ebe7555f1df9ff5ba7c63671974debc4be66
SHA512d1a409f6d45cf350076b24146a18ad496efeb1b1f15394c79658134d370955766c3b72788e0db7e09840872d124fc038bc7b1821da571c8afd59e2d3678dc9fd
-
Filesize
7KB
MD5ae4a2e04553a852453f0eddb783ce685
SHA1e081d789730c3fd25dc8749373184356361b941b
SHA256f8200b6e21cfcf0f6806fc6a84f5639707739d6f0f912b651dc3cf6841730f2b
SHA512fc4229512f6223f01b4ea2d96df92ee9c2053d88f9188601b626508a6f1555bb2e522dd4d315ffbb51bbd5bb2181df7002ee9d671cf13d68552f70bd3e2f5ba3
-
Filesize
10KB
MD57178a804b58ebf415415ed51731cfd27
SHA1d0092c6c5802753320276508826bb4596215b32c
SHA256315266e46e295fe50839c9912e87a01d6f2925a46d0edfcf66a91346357fe8ef
SHA51233bac7511ecc5a2565764e24bd2149a66c76357a11b67111f30094b9a249025d33e133a400688228793b44caf8ff44f5ea7d12af91cabd95b7c6a830ae103a04