Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
fb322986b6d6d339290c6a35ed332537_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb322986b6d6d339290c6a35ed332537_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb322986b6d6d339290c6a35ed332537_JaffaCakes118.html
-
Size
233KB
-
MD5
fb322986b6d6d339290c6a35ed332537
-
SHA1
b6e3cea9ca7dd4d6a25bf528e2f54aacd09a313f
-
SHA256
16f3174b0e52a624dc396afec66be6897e10a5ed60b128e09369498fc21d04d4
-
SHA512
7f5377ec83a876fe89374b5624a246b07dda8640a0d7ba64797d349345d85f35cacb9333b98b6b94dc26868fd31eb75cc5b0cc363c0cbca8541bc953851a28b9
-
SSDEEP
3072:SlguyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:SqLsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4400 msedge.exe 4400 msedge.exe 1172 identity_helper.exe 1172 identity_helper.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3516 4400 msedge.exe 82 PID 4400 wrote to memory of 3516 4400 msedge.exe 82 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 2328 4400 msedge.exe 83 PID 4400 wrote to memory of 4884 4400 msedge.exe 84 PID 4400 wrote to memory of 4884 4400 msedge.exe 84 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85 PID 4400 wrote to memory of 712 4400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fb322986b6d6d339290c6a35ed332537_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5c8c46f8,0x7ffe5c8c4708,0x7ffe5c8c47182⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14301063116015290365,18293305451099744585,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD524f206c0302ba8b7016efb3de12a2001
SHA105c15f6de30a7b376d1d577fc3ed37c705b9e328
SHA256332933b26d4f8f0b8f38f3a8c9b24f20b9aa350e086092e90d3e0289804a1fae
SHA512490aa88757b17ca99604236f8d25dd87d1df12ee562a3f1b3f2c842ef053b7475ba2e7b9094d1de4ddbb718cb3c6c5297184ea1a93f75ceb91b3607dae8795e3
-
Filesize
6KB
MD5612daa2ef435057dcd48505cf41ccd83
SHA1f790ec385a6bff8a073aaa5fb829a5be8485e286
SHA256cb79468c4b6c68fb542d6cda19c6b7dde9964ae52307aeabd1d4072ad33bca14
SHA512ef201fd1dc17a2ae9dd94f05fa8741732ac2ff96658c5981b17ab2f8a4123ecf39e84be46b14124123d269059fd1744bef33ed5cefc7435837088985f89c5811
-
Filesize
6KB
MD578cb7aa6607e6c7add32a2509eb7b709
SHA17f61343d6022bac6df06abefbfeb6567d36a8904
SHA2563831d0fd779457773e12d61d4cb2cc000d9632403f7be1b4b121948a18648fd4
SHA5124c353efba09df592dc5b1f9092ab7b8187b23aa43f19ec81d2f28413e9861622b52024fee9c4df9a2f3cd6728a999016ab863f56fe72afcd846300d400e227ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD506b127000f6847ec3f8108b9900e3576
SHA1aeb3f03e195e1bb90532ab3fa7812b3b5d9d7657
SHA256dbdb120527463e555d16b35615dc3dd2f9ab9664c9434faacd688974f80c7cc4
SHA512cd8388734f96e938e89807fa3ea8e91ffb9b75112b397eb1aff72ae30d0563ebd031c7f292a435782992e5e06cba0cfbbc1df2114d53ad12071fb1001b2b7fe8