Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
fab302bf250fd10f12ea2255aaa7c786_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fab302bf250fd10f12ea2255aaa7c786_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fab302bf250fd10f12ea2255aaa7c786_JaffaCakes118.html
-
Size
55KB
-
MD5
fab302bf250fd10f12ea2255aaa7c786
-
SHA1
d636a7793d09667381c977fa0f1a7420b76f02d3
-
SHA256
bfdde1031d5b1b2b19c5e9d83015c196f388794a0d54e8f8a70ae949a883ef52
-
SHA512
226cc07c775ab5d24a7c3b3b0bcdfa980b8012fa976c8c729ba7f2d6a66d49fcdfb34f1b567061550dbe98c100c459889fa40048014c6db80efee72036dc87e0
-
SSDEEP
768:9rabpHvvCIoodhfXBG+eItzfVdOYgWbhtv5UqK/l1JFYgVDL:9SHv7oq9Xo+ZtzfVdOYTil1Jh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 3168 msedge.exe 3168 msedge.exe 3608 identity_helper.exe 3608 identity_helper.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 2596 3168 msedge.exe 81 PID 3168 wrote to memory of 2596 3168 msedge.exe 81 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 5060 3168 msedge.exe 82 PID 3168 wrote to memory of 1376 3168 msedge.exe 83 PID 3168 wrote to memory of 1376 3168 msedge.exe 83 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84 PID 3168 wrote to memory of 4540 3168 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fab302bf250fd10f12ea2255aaa7c786_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab96846f8,0x7ffab9684708,0x7ffab96847182⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13616490315025472579,2248968478140123588,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3aca86cf-0409-4503-8bdc-efb2bc9bbf3f.tmp
Filesize6KB
MD53ef0c034322aab5b6db0cde78399fed5
SHA14d727dc29660e6b816531723a74c218ce79bf1c8
SHA2568f8525a47a76d1756175c2ef98ebb95e7f40b789e39dd499c1eef8ce02f53cab
SHA512d6cb9ce1d4e444f7e3f57fb9fcf2885c6a6371efd99be0d9845619c2f09d1e9e92851518753e0ce9edd7d7e865baee14ba0dafdcadcc5ad50886f202432affd3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c1fa3a992696f5836d3bc5b68cdb3c16
SHA15a3ed250f1e5528865694dddbf262e18b576ecfd
SHA2569575e8d55872a85b77ccf808555581ba702a8d27b42a808e3a2f8be70e0145c5
SHA512bc7dfd2d12bca0603f88939c9ac63002cdafd7175e86d7d9e1eb35f2e5c1ee79fafabe6267e11bc3d1d81e750dc685c32d5e1f16540c5e705f9deb909462ccc7
-
Filesize
1KB
MD54a9658effdddb795aa2d39cf267daf5e
SHA1793766b98890ef7068ca9c497ec7818863efe634
SHA256e582654fb716d8a61c660a6e43757d5962b7b5b0a229730ba4141a1e696fb134
SHA5128b362bfc00e4ba40b862743cfaeebbdefef0cd560f212537eb0c7f519f6ab33c2a7d8a87e915ce9ba082ef07a91bc939dea28237898fdb5e8f47c8d0df1f44a4
-
Filesize
6KB
MD55315bc1472364d16416037530468fc2d
SHA1bf59900266dddf6522f9457d00fbf8b7adaac9d9
SHA256350ab829bc56e827d7a2f225b433094a6bbfde95d7c4803660306df31a87e203
SHA512131e3657a93ac1bb8f1ad650550e2ac6fbc924a71c85cddad218ffd56058cec5552069e17873bb5976b0226e01ff415a0ddb74ee9a8af3b0e8a109dea3b7f8b4
-
Filesize
5KB
MD546005a3ed12f5f1960843e75adf2d2c7
SHA11f27ff7d4c6e555a9af963c168124eb00b54af52
SHA256a0cebeceb69cd492b89bad4326e07845757a524ca691e865eec3d7e1ba3240e5
SHA512ad9c94e94b236ff7aeb9d44e3ac393ffcb9f5ccfc1aeac3d2c646f852fd3c9f19fe74fe5408fd06166304da5a281f047e471a1535dec1c0852fcfde2f529ebdb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD560ba80ba36425a1dc77c2f5c41031e79
SHA1057810cd5b5dea4fe60f827137ebfc4ff9e318b5
SHA2566020dfe6d7182cdef9ddca88c94043cd6f41a5ad780ba4b37d7ecc384319fea7
SHA512b8c2f3240928680aa429e7412262f7c9764c73b0cfe7db2cc9a637305447a0de829f6589d149b4a375a7615200244ac734d19f6388bb8e24c30f8b242eeada1a