Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
fb886cf9a42234ff0d311a065fb02380_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb886cf9a42234ff0d311a065fb02380_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb886cf9a42234ff0d311a065fb02380_JaffaCakes118.html
-
Size
4KB
-
MD5
fb886cf9a42234ff0d311a065fb02380
-
SHA1
2c8c97b6bfb959a4924d91451283e6b11c31785d
-
SHA256
f93915770e142229718d367a2f3fe34cb5c798c193afc24d0862f20e0e77b0cf
-
SHA512
e8905e2fe6306e7b6e7a559be03b1bde491ab6933766bda00390d812fd269df910592896438221e69673b490d247d1e9934bc3e43546cf26ffe9cfa904cac57a
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oshG4d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 512 msedge.exe 512 msedge.exe 4848 msedge.exe 4848 msedge.exe 2428 identity_helper.exe 2428 identity_helper.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3460 4848 msedge.exe 85 PID 4848 wrote to memory of 3460 4848 msedge.exe 85 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 3652 4848 msedge.exe 86 PID 4848 wrote to memory of 512 4848 msedge.exe 87 PID 4848 wrote to memory of 512 4848 msedge.exe 87 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88 PID 4848 wrote to memory of 3500 4848 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fb886cf9a42234ff0d311a065fb02380_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8358585330286557368,7221605365837231565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
Filesize
292B
MD5b17710d4acf1fb15ecd2992b0f88c182
SHA15abdf84686f549f2e7c8897ed2d6a2c5f397958f
SHA256e6cc2dc6137289dee64730f17b04d1e72a4ab4f48d29fc565609018af8ee3f5c
SHA5121b07be1ed205c4ddcf4680e4fddf1d528ac2321a5b38bf1ea84c9f32ace3a8f6616d24433057fdf9cc83f18c55875417add33df1a626b1aabfb84445ed49a503
-
Filesize
5KB
MD54575b335678e9aae7d0f919de3e7634e
SHA1a135f20dd76042c2767c9cea0bbff233b7fb7cbc
SHA256a5ce6f50d6be15fafc5ba46de92cb03a9a1f78f968ae6b9d0f18331222e92e22
SHA51202c21867479aa05f9fbdf7bbe1c915f640ded7db94ca57c2b105ac5b4bc46b56c3726a21a6b202283e170257fd5efbde1f6c1ff5c39de8f883aa27d1652add60
-
Filesize
5KB
MD5c8c025dff83efbd81fa492180a85716d
SHA1ef3c65ae05b001ae28c8022f82d3dee000f83a09
SHA256260eb4e4778ea816651acc2e4306da7cad41a4ff330c6e9726322cedd4d2f29e
SHA512b7d60ae51090e2c0d8f3da3c2ae30b50b0a819993d3de024523199d94dd348ea21f82a143b7150cd90b6bdf5e6e1959bb3fb0e8ffec5db2db8d1027ecc91a6a9
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c3feeac7a2d39a5860e8645f7213c67a
SHA19ea924a31e52f213afc418cbf64a7d5dabc83f8d
SHA2569ed1c7850364934ec8f7d6179db117acd356577737e8b1f794519d12b976847a
SHA5123b4bfd02f7eecf422ed0806bc41b71026503b5499c08cb99db78aeb561cf1166783f5e41bb6fab1e7c4f83509ee56732a4f105c4bf1a969269d716ebde8c89db