Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
fbb2694755d44dd5eea3e6a187215a90_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbb2694755d44dd5eea3e6a187215a90_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbb2694755d44dd5eea3e6a187215a90_JaffaCakes118.html
-
Size
31KB
-
MD5
fbb2694755d44dd5eea3e6a187215a90
-
SHA1
ab2437dc99f606329593add6c376f7c718444673
-
SHA256
4a6bc685825c828004ed85358110b4439042d9e72bab63f7c1a835f098fd8d28
-
SHA512
62561a972516ce66ce476b046bf91ba87c26ca41875bdd6f8ffe18ae521902ad7ba32366669e5265f74526ccdd4ef93c6b58a84710d8c5fb082e31b9c9f8d791
-
SSDEEP
192:uwDdAb5nyLNqnQjxn5Q/QnQie7Nn2nQOkEntUOnQTbnZnQmS2xlXrYlw2D4/KPEX:XQ/5RxlXrL2DfpCwA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4936 msedge.exe 4936 msedge.exe 668 identity_helper.exe 668 identity_helper.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 2640 4936 msedge.exe 82 PID 4936 wrote to memory of 2640 4936 msedge.exe 82 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 3588 4936 msedge.exe 83 PID 4936 wrote to memory of 4400 4936 msedge.exe 84 PID 4936 wrote to memory of 4400 4936 msedge.exe 84 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85 PID 4936 wrote to memory of 1376 4936 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fbb2694755d44dd5eea3e6a187215a90_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3b9b46f8,0x7fff3b9b4708,0x7fff3b9b47182⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14462010941066591964,799506509026944696,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD509764b3c5af1434a1a71f39a1968ba49
SHA1e0a79507616980c3e7d878710161f19d7ad30fc2
SHA256af80db22d60dff58faa3b02762f554ca25c17890e5f322bba8181a18a4c24145
SHA512390bd7d792ab1ea5d635056eb3b2d6b4df422eb239626988adb9bf092127b65cb6593922fd520b3364565e30b05e0fbd08631b7d3740c226c542f368cfe898dd
-
Filesize
6KB
MD51605d41098a5a0a44a128a7f3c0d537c
SHA1635e7de114cfe4eeee9a52e748b382bcb4fd5f3b
SHA25610207627663ea5f260511260f8be1f3a0d47effb0820ddd9ac2cdbff2c2c39d6
SHA512e4073df6d540b71af78e8fc06e989752d72e1bf7cf3f3e176d1e3f23a85e8ddae2bd24903374e063b650bd2cd0aee523d0f8608d8b51e01b5159ded8898a61e6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59a1dbcb15d94e4c9cfb5c06a9aa76e99
SHA18aa6abb0f9c114bfc39ba2449847a6e426fb1153
SHA256cca5aeb3a8cdb7751286b32c5b2dd290340b77999cfdf09c51ac650ef7ccb722
SHA512962ed9347b8ba0f4619167a37caeb9168e20599717eb3fbf72fcba9effac74d3c417d60526701a4f110bb8994903888d2cf3ec88f727bc2da16282ab633d98ac