Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
fb803349c763e3eece43ae1cb1b97d21_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb803349c763e3eece43ae1cb1b97d21_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb803349c763e3eece43ae1cb1b97d21_JaffaCakes118.html
-
Size
15KB
-
MD5
fb803349c763e3eece43ae1cb1b97d21
-
SHA1
3318495ba88cbe910c7fd4b72d939818a55f5ecb
-
SHA256
1627a599eea8f9d8e1083b8f1e43b3a5870d0e989ab83a2bfe05c3f63cf3e37f
-
SHA512
4486cca89dfdae71f6e41f432b1c53f9e0f085ae0464fe09c32c0a0f6bc15379ec6fdbdb9ed9b9914483fcd73ff49e6df9886c468763f8a199b7f1c39a187e19
-
SSDEEP
384:BWTj3pGk5E56AOldVH6hzM0NOfcrafOhnWBCghd+wRzdApU4JDo:BWTj/qJDo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 4792 msedge.exe 4792 msedge.exe 3608 identity_helper.exe 3608 identity_helper.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 2756 4792 msedge.exe 82 PID 4792 wrote to memory of 2756 4792 msedge.exe 82 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 4784 4792 msedge.exe 83 PID 4792 wrote to memory of 3980 4792 msedge.exe 84 PID 4792 wrote to memory of 3980 4792 msedge.exe 84 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85 PID 4792 wrote to memory of 2000 4792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fb803349c763e3eece43ae1cb1b97d21_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa579246f8,0x7ffa57924708,0x7ffa579247182⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10993817155394813543,18400660226481011474,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
598B
MD5a07a1899e863108e0e57db0436b72c46
SHA1a7f5753ba9f1ac0f53a45d4c4ee57caa6da319c9
SHA256baee72ee9f414a63b54cd645c4d20d38ce2180e02a47d2a830606320c0fbac1d
SHA512ec3a23819454e61dcb662329321b8b313b01b78b8673aae67d8d53126500e2c3f77aafa8a3289e0a1eb4921c4d4829c2d706a699a121b5a9451502c595f66410
-
Filesize
6KB
MD526ec080e1b892dde991cb2ae2a8f9e66
SHA15b9dde3c9964e0a56d800e8d2695299c5db93546
SHA25662f329bb096cead3f53d35007d933c8aa13a23bb5df0658b3116044f8b2054de
SHA5121e530b44c35749fd6717f6fb1f3ccada078e2668bc2caded929968ef4f6e9ce0bb2dfc4f8f524ad2524989b08d0c9f7fe0f06a22c1bb79726c75e0d2ceeda521
-
Filesize
5KB
MD5acf4b12a6787ecc5ea66be342baf364b
SHA16fd3b2fb4bef9f17de8b8a11caaf1d6ce7af1dee
SHA256cd50fb8abef8f2739f1ed11d35fb0f302040b3825dd3dd903d00f54b94d0f297
SHA512765339dc696c67960b92245748938107f52c3a457ca6d9fec63de9c6410f440555c461f11fa1d3f503aed7d10029a2f8436b5c293355d9c1a8b4b805d0582c08
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d1ce2a0d8d07438ab802fb1b35c84bfd
SHA153ee601de550d507b95ed71ce82f5168eb718e31
SHA256a920bb0aad52a0ae63a6e8c86afd1e9223338804c653f3cc95f3aa10c41c8bdf
SHA512b0feda2990daf50238b39280fc90cb03d71c4a0fdec3e130b1d3f0fc2522aaef968fba78f68d0b36943d97ddb8b8148f6a55c693290bf4eef72d39458acd3973