Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
fc6c9186b333dddc9a5bcb421023a28f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc6c9186b333dddc9a5bcb421023a28f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc6c9186b333dddc9a5bcb421023a28f_JaffaCakes118.html
-
Size
30KB
-
MD5
fc6c9186b333dddc9a5bcb421023a28f
-
SHA1
697209155ca3ffca211e0980bdc62193fae7896d
-
SHA256
912072f7011b4412a2600ac7e9b89ae949ed5c94be1d8b870cb7b091f7fd2e39
-
SHA512
e3383b19347ed4aae3d692b48914181e753e3fe25e16c8293de96671f03b7ac48d663260a12ae053766d60b6b029ccad61c96e16be6c116b929321fccc976674
-
SSDEEP
768:9daZ3E/sK715XgCtCtCtCdCdCNCNCBCnvzs2BPIxzXol9EZAEnFO2OqIFE8n:9d03rK715XgGGGGGwwECnvzs2BPIxzXw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 4848 msedge.exe 4848 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3460 4848 msedge.exe 85 PID 4848 wrote to memory of 3460 4848 msedge.exe 85 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 620 4848 msedge.exe 86 PID 4848 wrote to memory of 2776 4848 msedge.exe 87 PID 4848 wrote to memory of 2776 4848 msedge.exe 87 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88 PID 4848 wrote to memory of 4520 4848 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc6c9186b333dddc9a5bcb421023a28f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6372152864390342093,5565407644180080315,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6372152864390342093,5565407644180080315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6372152864390342093,5565407644180080315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6372152864390342093,5565407644180080315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6372152864390342093,5565407644180080315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6372152864390342093,5565407644180080315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
Filesize
5KB
MD5f39524454f79d83720ea584a75cd4638
SHA178113732c51072a9702f800f2e5c0918bda66ebf
SHA25640875d2d10e8f54f0c548fd79f5404ab835ff323f7f5cf1ff60e65bdd2e859e3
SHA5121b07784f9b61c7d1ee8219e3cde88214e9f0ddf8f937b7f6ce5190ffe5c42acf1acb9825f76dbfe7386b3bd0416d46e4e91860495731b221bd5a72aeca006584
-
Filesize
5KB
MD5a4c4122237f9246bac6a33d312666df8
SHA14218745a2d315beaeee4b021fd4cf4e9d1e05474
SHA2567f45a77dc2141e65ce7a3208e6de708e773fdfaab355180c985e462691c0617d
SHA512356aa42bea3f42a31372e8cc63151f515161060f1734ab644005bc310bf3691de6b17d28242e3367a1546dceb131880c72b6bc30691845720a304ad4efaeb102
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
10KB
MD555c41e2f5121a2c8be69a8a9bb9db4e6
SHA11ef73b4f616fa3a9f7d187d5d4574760ad671a65
SHA256cb61e2d1b4cd6cfc5a5b3b8d5d4411512633ea51d006896b374d5301389a7df7
SHA512e48b56d346b8a40bf30deebae9de1c423047b985fd5115f4fd259a4e1e7dbd4b0aaf924fee5dbc4b4971ac9387d0101e41781bc88f28febef6dae175564c645b