Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
fac8284996ad3c0b752e227be2c6b03d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fac8284996ad3c0b752e227be2c6b03d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fac8284996ad3c0b752e227be2c6b03d_JaffaCakes118.html
-
Size
139KB
-
MD5
fac8284996ad3c0b752e227be2c6b03d
-
SHA1
373c62bda78b73bba9ca89056269f3e6e20cf7fd
-
SHA256
c20ce2a903710018374d3c571237c541f21198b0597546928f57d5dda79b6c1d
-
SHA512
859006e776b282959e3de23ebf8cce7af7db3cd5fc3c42ceebeb6290528f8c95879082c3584072f699f9a06f722aac87f72f3a97286f62e808e8648a2ffa82fc
-
SSDEEP
1536:StvinCNloyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:StiCYyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 1640 msedge.exe 1640 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1052 1640 msedge.exe 82 PID 1640 wrote to memory of 1052 1640 msedge.exe 82 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2636 1640 msedge.exe 83 PID 1640 wrote to memory of 2612 1640 msedge.exe 84 PID 1640 wrote to memory of 2612 1640 msedge.exe 84 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85 PID 1640 wrote to memory of 5064 1640 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fac8284996ad3c0b752e227be2c6b03d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3f7f46f8,0x7ffa3f7f4708,0x7ffa3f7f47182⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6236637976094171745,16671363772444578505,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6236637976094171745,16671363772444578505,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6236637976094171745,16671363772444578505,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6236637976094171745,16671363772444578505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6236637976094171745,16671363772444578505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6236637976094171745,16671363772444578505,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD5101b327cb75095fd3a5bd16ce47c2fcc
SHA19feb2caa7d23341cf81860be2af5a9959c5f594a
SHA2563b862f766d5ab374637a14ead98af4dc5a8761b1a489b36123aa5456ade999ea
SHA51278203838d403ea50fa03e47699ff5987e27863b694dedca82d45117fbc4dbd231b09d6042af7f45d35697d17ff5cbee6c7ec6d6fea166d53180ba362b1a9b2bc
-
Filesize
6KB
MD5b460655a1e291d76ce9a911d87e1a111
SHA1eb2b544f7cbfdfa59d70acec91243b39c872ee04
SHA256ee166561e6915330bc362bdb3c5031c248648c499c40768f8ac5ed37a0442434
SHA5123fb5bbc47c7414e4c63565401838fed588775e3d9f52238f8001b567003cfcda2c3c8cc3047a222ee972d7c017cf78078a19d30dae99491f0f820730c3cabc7a
-
Filesize
10KB
MD59276d9f22750ce401488c4852a8918e0
SHA1e6b825b763086f067a3fd1bc2f127626208b9ef6
SHA25620e4fdfc9d6b2f4e2cdfcb0145837d4743b2e77efc0e650b659f51309c46bb2a
SHA512458d9c7d126e7d5884b5fe070ebcd88720e89ca37ea49e6498d53983853d2b95b26be95ee95a717debe55e6c7745d65545efa5b54a0bd41b452aca8b0d41a9f0