Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
fbe219f4d7fd8588f121ab9eb7e4505c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbe219f4d7fd8588f121ab9eb7e4505c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbe219f4d7fd8588f121ab9eb7e4505c_JaffaCakes118.html
-
Size
87KB
-
MD5
fbe219f4d7fd8588f121ab9eb7e4505c
-
SHA1
073cc0aad50cffc05ff7daa474dd8f29c059f8ef
-
SHA256
42c2993e538fc83545b6be96bcb99e35b7df7ab1335cdbe07d74817273c25c44
-
SHA512
79e3ae464f86110b05685a0d96b116f64eb32e87022543414d724fbeb056fdb7bb6131ac957768e942db5813bb3a521c7b88dbef0d319e2de1791ea37f83cfdd
-
SSDEEP
1536:IsSyBrs1NiflIuwJoN8h5btXfMFSw/FVLBeRXkJhr9NC0C85l85XGFJjyQWAdT14:fSyRsCflZwJzhIVBeRXkJhr9NCoeAlS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 1824 msedge.exe 1824 msedge.exe 4512 identity_helper.exe 4512 identity_helper.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1536 1824 msedge.exe 82 PID 1824 wrote to memory of 1536 1824 msedge.exe 82 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4020 1824 msedge.exe 83 PID 1824 wrote to memory of 4144 1824 msedge.exe 84 PID 1824 wrote to memory of 4144 1824 msedge.exe 84 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85 PID 1824 wrote to memory of 4240 1824 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fbe219f4d7fd8588f121ab9eb7e4505c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa591d46f8,0x7ffa591d4708,0x7ffa591d47182⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,13565172730400280396,5624261726291544563,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD574fc52a0e2ef519ea981f7a138a877e1
SHA14271d1761cdc21da0d1c2ac5ed8e3681db2bf057
SHA256431d3b275aae0ab787720e419cfa6a2f4a8dacddb30526e9ab758aec0ac06db6
SHA512d859ddcf6e2fb0d445397818c2d9a3dd2c35094ff348c6846ecb848c829c3dba50abe2c7a81f12a50db9bc636bf3bc06842e9a18b227916b6b686d76e7466951
-
Filesize
1KB
MD502aa5929b355b05e15c663b98312eb5b
SHA1b341953b46653698ed75e0dd5d689364bd4bdc45
SHA25686f5440a8b26e1df0fe862985d02d40567425ca25634f14b90f838989ad3eaf2
SHA51291156d5daf219e959508c06fd461c6f2816b1894a0b76c8ff354748a040c2eb23b2870fbeda7b530fb04531846e6483e13a96c797a04057cfe5aebc3dd8b858c
-
Filesize
5KB
MD5c66815288912151b739faa3c67c467e5
SHA1050f1bfa0cebd950e627802b1764f12654ac102c
SHA256b6d1ba95ba5b5087fc79896a11d203aafaa93703bd36bb2f7816c78ebade6e1c
SHA512b28c2988066600343239796bf03f5df547a2251c0c77bd490a7e1f9a40ca6c02b22b193ee0cfa7b585822d412744d9b3f80119347e3961034b284843362adcc4
-
Filesize
7KB
MD54b4ab4fa121cf24d5a3a410c5ab4dfb4
SHA1b2ceac562b2669df4ea8856639341ab8d01d229d
SHA256cab232cae5b19d124e872ed53191a6e82510b1682b6dda0d1c457fa73f46cab8
SHA51214edb495503816416b0a413c94ba7c7d05bbaa31020bc4d2d76293dd4c3b9814a9355d956236e2e422fdb9d8ef54d32e22bbd7a05156ea660ea96d712ceebc16
-
Filesize
7KB
MD51b534fb96a553fb865c24e477fd4df89
SHA1e60d19a1d53e4263e398afbe62d4c4b3d29307d5
SHA256569c10cc979d2c2e0f1c1e334f33f95db1ef93d0e13acf90544a9ba181d12894
SHA5125c522bb0b01a064bc5b396cc8f33a62368a7b17da11638def4bf5375268e4f62fef38696b24b604f4712703d56f756ceb9d6a29bd9dd4754d80c2cc1ccdb21fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bc879a2cae1321559f0417bdce2461a0
SHA1de22f8a365a61804266fc8cc20488f3010ed77c3
SHA256a19b5dd032999df045eeb557a2a52310e5b723baba918bf7ed680194637b39c4
SHA5122da3cc3e960cf6337b52f4585dbd48d81bcdca3305879ff97039b91ab12a339ff87f2711a149d3dd30da00298775269fd90a0d522d3cb5a903b06025935e1fe4