Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
fd4668290d808dc486a08eccb5b37438_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd4668290d808dc486a08eccb5b37438_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd4668290d808dc486a08eccb5b37438_JaffaCakes118.html
-
Size
192KB
-
MD5
fd4668290d808dc486a08eccb5b37438
-
SHA1
66f70f0c871200971acefc8ea5b4f99dc70897a8
-
SHA256
86995f37535f7b7d8d7d9f610c9da28766519211a9caa4245514681574752c77
-
SHA512
acd139ee4fd6ca753a7d055478eeb553bc761b844006282e87f6245ba870ff6b4a4cc4c31d239262440ae26497a30bf808f8691724bf100e533314ae1985359b
-
SSDEEP
3072:lohxYjK53ObmKe66SlsR5NYoonohxYjK53ObmKe66SlsR5NY9u4WV/Q0jmdhzeH6:3GSVP9tGSVPpuPLEhSHTMdOnH8P
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 4304 msedge.exe 4304 msedge.exe 2528 identity_helper.exe 2528 identity_helper.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3468 4304 msedge.exe 82 PID 4304 wrote to memory of 3468 4304 msedge.exe 82 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1220 4304 msedge.exe 83 PID 4304 wrote to memory of 1356 4304 msedge.exe 84 PID 4304 wrote to memory of 1356 4304 msedge.exe 84 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85 PID 4304 wrote to memory of 3512 4304 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fd4668290d808dc486a08eccb5b37438_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb08a746f8,0x7ffb08a74708,0x7ffb08a747182⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,6132131505011737930,302195156595571537,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
516B
MD5d4a3aae1c68c3b9de9b79bdf19129794
SHA19026f4572973ee3d32d2c03b889d55df805557c5
SHA256f8b7aef72ad36a8e3e18f3d07f5afbb6af9eb47dbd01b309b726fa7b8f1d3e95
SHA512e6418bd3d9f99ea74d0de7dd6c0fa8826b5bc2213910e71b0f892349e13be3aede3ad0fadb108b1a2d104ba7e75925facd59befb6f93c8d379ebe0811bb3bdca
-
Filesize
5KB
MD53bbbe016782f5fb2be3816bb5b6d4096
SHA1eddb719edc4f54e0ac20ef9e2de6eb5689195dfe
SHA256c686bcf03d9babbb9682aa0f83ba7b7e1fa7f5e31082f78d289c62812f1f4131
SHA51283e688640f3d00f99a22bd0fd10f84674fdc0151bca5166b109ed5ab1ab6caaccde5f7cae83cc82a8ca86db73ff864ad9d196f62f45ce3fe22d8c490204289e6
-
Filesize
6KB
MD54cf8811c0df0661d8c25c8bb28eed19c
SHA158b5c028bdd8efffac3cbec46d13495443544777
SHA256b9e8493f2acf69e09e1da82aae4dd15601649af2f2ad4ec87b1db6a2563e2bab
SHA512a84cd974032ba3786cf42f6bf18d546e8843ecac1c337c8c1c53b9498f2b9077e2dce3e06dea0f36414328d5ef62610c4d5aa4d4dbe92a40964d46651fed050b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD540ac05969436bbcfb5c38ecbb5fe62f4
SHA10aaa3f1f3fed3f8de47ecc0600705b9ca7071bc1
SHA2566c1ee7309306a1c423622ac42d5339e50b0e6642b1532805610f91723784fa5b
SHA512cbdf23b1861d425e16714ce84a1d9637730575437c8ca0823d3bf99ef5f4b53192d77ec53fab71f9663298775cd97a30f5bc8ef457923a67d486a0324d1cbc58