Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html
-
Size
70KB
-
MD5
fbed769f7bdcadc48a030485e4cd02ab
-
SHA1
882194482e3471b507713d636b561de08d51ad32
-
SHA256
c85379e96772b8beae25d448dee68d8a1c4f18de2e6fe0a2ece7532dfd0612f3
-
SHA512
fcf514bc4f273765ed2d3ce933a67dcefd785c83fbba422aae5585f33cb2c394b355862184c0d0f6e6dbbdcc07c7b1225aa3f4ec33d7c8904e4f1fa103365edb
-
SSDEEP
768:JiOHgcMiR3sI2PDDnX0g6sVa6PTpIdIiZoTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:J5Av8sTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 4848 msedge.exe 4848 msedge.exe 400 identity_helper.exe 400 identity_helper.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4824 4848 msedge.exe 87 PID 4848 wrote to memory of 4824 4848 msedge.exe 87 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 512 4848 msedge.exe 88 PID 4848 wrote to memory of 3156 4848 msedge.exe 89 PID 4848 wrote to memory of 3156 4848 msedge.exe 89 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90 PID 4848 wrote to memory of 1880 4848 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,1095647513742429316,8003682454357956463,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
Filesize
5KB
MD5c5cc0ede72385cb0afc2dc58b0c95366
SHA11d33dc7c820428ca7074670a201bf4cbe067da08
SHA2563e4e7fd88d8e11a30157afccd9d3a256f996a132994b300d65c805a0fb62d672
SHA5120e67a8dfcb7a8d98b3635748f10e8be1315e6df57c8f2f43407d2c18fa34e8336063a75524accbf98112b671c633e16b7b2c693cd3c4b28e5297f9dd122970d9
-
Filesize
5KB
MD56fc63f45796776cab629e9e161e54482
SHA1720a5e4d6c0eff3495f83692833a0c7674b36a66
SHA256b2fda9472decb283f9cded0197a12bca9f4c7d631942950a433061b53ca36ebf
SHA5122aa45ca8ce39e87a13d9c393c1fad48adaea8470c81b064b106cda9b4d5164aa361387dc9b8bd38af9ec1270b27239574d54ca2101f638de4f10394559c0b925
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59023a0a8c42b4a81fdb66a31bd07291f
SHA104c64c6b97a75018c66f5cfdb5c1bf06f88a990f
SHA256b50e2c667f28f334cef8c58318fe221957a6c51b218e7537fea42b90e7b48a3f
SHA512e04a931217e6acbcb3731dd5deb8fd7f59e870728d8848b39dc79f897ad888f6959035ec81cacccca78568bf49e9e498a21719db5ab526fc65f35eca5c061d46