Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
fc641fb8f13d4800a85fd20cc2b70f5c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc641fb8f13d4800a85fd20cc2b70f5c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc641fb8f13d4800a85fd20cc2b70f5c_JaffaCakes118.html
-
Size
6KB
-
MD5
fc641fb8f13d4800a85fd20cc2b70f5c
-
SHA1
e714fc7adb3785f4e028071155f9fcfb70b546ba
-
SHA256
eef86548b9c6230ac7b497b3ec4c2172dae01ed724d3ee7785612ad3e1d77d6c
-
SHA512
a38c8b07893fc89a5e65246992b3f394efc414ebfb8cce8ad67464f5ccb7855795e976991375580c4e6d612fb92c4525592025b38633fac686c429a64d572dc3
-
SSDEEP
96:1eEQwhZQ2H3o//NVLyyyLYTpNz4DNT8vbzSebN47dBUGUYpaAxXS+1nbTjGeKhBi:8f2HO/uyyL4Nz3hN47rUGhVxC+d/jr4i
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4428 msedge.exe 4428 msedge.exe 2564 identity_helper.exe 2564 identity_helper.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4428 wrote to memory of 4696 4428 msedge.exe 81 PID 4428 wrote to memory of 4696 4428 msedge.exe 81 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4708 4428 msedge.exe 82 PID 4428 wrote to memory of 4516 4428 msedge.exe 83 PID 4428 wrote to memory of 4516 4428 msedge.exe 83 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84 PID 4428 wrote to memory of 4056 4428 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc641fb8f13d4800a85fd20cc2b70f5c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9115346f8,0x7ff911534708,0x7ff9115347182⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15665391194898642710,10860190251373019923,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5b456df0f805659c264e3947d12336b00
SHA168626e4a4662d6b8cbe004cb083be23e552fb298
SHA2565d2a1467250b2a3522956a8c6f85e7f8ec5024f8a6eeff09afb2ed5f28a02a32
SHA51236d63f9dc799844b9bf0881a9ca283ea734c08969a050dc1939600272ae1999963b12936879318d52a99d272e656479c64afa31e41a089acd14f07d1994e4480
-
Filesize
6KB
MD578591b6dabdbe57195f4ff3c55b06ff5
SHA14aaecc007255189dd346cc079ad83a3483eb5e52
SHA25639822764f9e2a18c730b95acf07bf467f3664181964f2564263fb603aad8b557
SHA512f1509e1ba8faf365a98dfe28924f650c3dded2b7ff489461c15eda5168adb4d428f4b1a27fe133c057e6c5252f47ba6a6cec88d8a2a99d61dd9aeeee98843d29
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fe706f6911dc260919d18dbc46ea02a2
SHA1bfa255831f5a3361d70a1a35873640e5bdbff54f
SHA2561596431c74eb091c22d82e0f1b90f4f1be48cb7ef26a37caa799c9e2c3540e27
SHA5123c556d74037659f027cfeb151f01337ba0506f24821976803dc7305b76362b3a1267f0b5258b5afbffe5f60a32165d5e7120ed3a8d682f84848822e98cb7a33a