Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
fb2f90c3c88ac6a51bdde0adb7412e7a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb2f90c3c88ac6a51bdde0adb7412e7a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb2f90c3c88ac6a51bdde0adb7412e7a_JaffaCakes118.html
-
Size
61KB
-
MD5
fb2f90c3c88ac6a51bdde0adb7412e7a
-
SHA1
c776d7c4c1de88de614b35e5a42e451945d9ba70
-
SHA256
597dc44b2b12e77b4c4bb8b2d4a55caa58a6ac7192fa6a0e7f9d82d3d88d9f8a
-
SHA512
4207fd9f6e4e523a1e7b0d29e4e6386688aa67e291627aef490d9c0b94467575a8110ca1ef15b7d15fdb453f7758a632f9b388da3fea5d7b5f1da312cc2ae13c
-
SSDEEP
1536:NTGlw0buCH8wNW3Yj0xjGG1Eabv/GSOWpDWM9xkAwlryei+vf1fZfdfzNjTTKQZD:UvdB1gjTN1rmRx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 4448 msedge.exe 4448 msedge.exe 2448 identity_helper.exe 2448 identity_helper.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3612 4448 msedge.exe 85 PID 4448 wrote to memory of 3612 4448 msedge.exe 85 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 4264 4448 msedge.exe 86 PID 4448 wrote to memory of 3528 4448 msedge.exe 87 PID 4448 wrote to memory of 3528 4448 msedge.exe 87 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88 PID 4448 wrote to memory of 868 4448 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fb2f90c3c88ac6a51bdde0adb7412e7a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb979446f8,0x7ffb97944708,0x7ffb979447182⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16850695098292705919,714759981146078872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
191B
MD531a165e4f840b2b7c1b5ffae7add77e2
SHA115420bc2b2a8874a6b28bfd91e02156253e0a136
SHA256957f4f4d240b2b434f66b0830bf8e0a3e188a66c6ad50897481c245523510342
SHA512d78026c6213daa63769a286f2a455de472686f23cf7b43aa409c5e5b46e1bd3809bb1268e743993b9b55f03116af17e78063547e8bc6eb6f629e5c226bb031e3
-
Filesize
6KB
MD5176e1f41365fbdd213cb005a645a151a
SHA1c0de28f06d1e3bc40b4c3c7662993b464dfaa7b0
SHA256da345191f92b8157065b2bf820363333a857dad0ab807d9c820d1e2dbd7f6636
SHA51296270bc1ecbd6b50b5847c537422ab156adb20682611ea389088c6c6129659e73c01731909393eb17a40eb932d7a9b266bbb678468f0bc0f5437f664c0307edf
-
Filesize
6KB
MD527e954cc28249439fdc5209d4dd0da0c
SHA1eb6745bccb6d44e4d3d40e401375fe2dc8b94ea0
SHA2569d2c6dffbab8755591f9ca5784b86fe40398155ca1e5edc9b35aa2f74e152a6f
SHA5124661a45e42eba17f3f47157f1884c11878c6530098a2326f379c33a15746ca5784c8a90f10dcf8f33b349d6efdfafea259a3e82c5a16faf30f42c1c44347e4f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD517313973589e4bd62af6c3898dbb16bb
SHA1f9bf8c56922c42b73e580fc5c648ffcf9e2bd90f
SHA256383d4cd247627ac3fe21b717960c9efe45a86c14e5ea719b4e16522f0cf35b82
SHA512c0c5acc1b958af61e83ce3c5a3e194ac5d980cf8877dc66a9b20d6b8c51ff87996a328e2743c1056e7a2ed18945ce42dcd6031c8f7319e1ff102e69260488704