Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 04:15
Static task
static1
Behavioral task
behavioral1
Sample
fb7beb4a59c9a85ed5a94a4fe49d8faa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb7beb4a59c9a85ed5a94a4fe49d8faa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb7beb4a59c9a85ed5a94a4fe49d8faa_JaffaCakes118.html
-
Size
126KB
-
MD5
fb7beb4a59c9a85ed5a94a4fe49d8faa
-
SHA1
4c8423a530a1062a284333abf8ecd7595ef49deb
-
SHA256
6cc2c450982350e8c362567d26b48ca804ee5acf16658ca0728cf4c5a4817f01
-
SHA512
04243601b1036df62538ea8f3d627a4b6b89180f9405ca78780e6860fa9f861368e61a947f03439df8d98468676954218ccbb463da4477189a509f517c6f033c
-
SSDEEP
1536:8FlryLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:8TyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 5080 msedge.exe 5080 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2992 5080 msedge.exe 82 PID 5080 wrote to memory of 2992 5080 msedge.exe 82 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2320 5080 msedge.exe 83 PID 5080 wrote to memory of 2540 5080 msedge.exe 84 PID 5080 wrote to memory of 2540 5080 msedge.exe 84 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85 PID 5080 wrote to memory of 4388 5080 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fb7beb4a59c9a85ed5a94a4fe49d8faa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d48d46f8,0x7ff9d48d4708,0x7ff9d48d47182⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7330634591217777645,2657900116962345697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7330634591217777645,2657900116962345697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7330634591217777645,2657900116962345697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7330634591217777645,2657900116962345697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7330634591217777645,2657900116962345697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7330634591217777645,2657900116962345697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD55dadf3b9c9439352f7e2947b24eb0e08
SHA101c5959740d8df6f1f6e04fce1357fcd472e9001
SHA256203ed12a516d7b2f04797c25ef23787c9cd727ebcbfcb818ddde9ca2941201c9
SHA512ffd0c5c3c7c8f8d17424504d3df9d82114cceddf34c0c9351733b34171e6504a9de9bcd3f3b32bffcbbcbf637a6fe4960168c2560713ae92325c3027fb0be80a
-
Filesize
6KB
MD50cd97b9a7335f8b55fea8fa8cb9cd1ea
SHA151d7a94d81f0300f90213b1fd2fae010f94eca4c
SHA256fcf025036c2cd55d855e0aefb024bde0c81cd1597f7f62f103e36a7d33b2dd93
SHA51294389a103bfc55929a43107d81b6482a9f2b8061c5f6cba24124b83f03d4bedc29a0d408832b3c1b498667323ef679085f986792814978e33c028353995e215e
-
Filesize
10KB
MD50bd955736aad39758fe48ae435dde27e
SHA1f0126ae0a6c2383b6f50e0dc8f349b50271f178a
SHA2569c0a2ff6465d81a298d3ebcb35ee87f33cc6ce21a8d530474c72d5cf8de51278
SHA512a26ec732de4a2651c8d3c4b80ccce6116dfa76e5b0a52772581dc9d69bf0b62bf8094b6f31c852132047cf34c20f6fc04d215d992392cd390d7523219b61aee3