Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
fc90c484c96455a27822a35c7fdf2d03_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc90c484c96455a27822a35c7fdf2d03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc90c484c96455a27822a35c7fdf2d03_JaffaCakes118.html
-
Size
18KB
-
MD5
fc90c484c96455a27822a35c7fdf2d03
-
SHA1
8ac0b2c9b81cd443d8aea5685f803ea53b06ac59
-
SHA256
6880550c908683019388eabae517d1e38d4ca8dbf152ca134220bdf0258bef67
-
SHA512
ff7ae5a8ba08f7ecb42298a4235d6fa7e6e2d20ff913f0ae1e2c256fe711f7d5ab936ccea6ea1ddee002d047b8b33bbc82c444f596e3758d0ce28defaa38669f
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIN4pzUnjBhHJ82qDB8:SIMd0I5nO9HxsvHixDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 1548 msedge.exe 1548 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2636 1548 msedge.exe 82 PID 1548 wrote to memory of 2636 1548 msedge.exe 82 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4800 1548 msedge.exe 83 PID 1548 wrote to memory of 4476 1548 msedge.exe 84 PID 1548 wrote to memory of 4476 1548 msedge.exe 84 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85 PID 1548 wrote to memory of 464 1548 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc90c484c96455a27822a35c7fdf2d03_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81a2946f8,0x7ff81a294708,0x7ff81a2947182⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8911912844948962290,10006022002840530119,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,8911912844948962290,10006022002840530119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,8911912844948962290,10006022002840530119,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8911912844948962290,10006022002840530119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8911912844948962290,10006022002840530119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8911912844948962290,10006022002840530119,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5d152b9489b9af557e075fbe06766b7f0
SHA1f525c58cafb0a24321cc4f604587ce0fadaa405b
SHA256b3f7fb9b26d6810f5704da076301e06e70316f00f537875ce76ed9f7fb2f59b9
SHA5121efa659acaa5c6d441d5cf23a2c14f9ceac7af621096689de0795fcb5f3e5dc7e462bf9a512900b712fa8529a1a651fcae482501f4c162079b18fb07659cade1
-
Filesize
5KB
MD534f4361fb6e90b44ddeeb66c4bfdbd28
SHA1e9026e348b3b64151a2ddb692854f98be7ea0a18
SHA256974567deaaed40a91a45722cb6f8b17f159af39f983b485a3e6da7dc8df429b0
SHA512f8c1dd9d0832034616706e0ba3dad1e321d064f970b1ce0f214daade2b1842b0f838847050d33afdfb1cb4ef69714346f727a0371c9ab10cba3ec5b3f939a161
-
Filesize
6KB
MD5cfd2f60a72de3aa053d6fb25f2244013
SHA1d8cab7f134dba176ddb8170f0c0511ae2c26ee0e
SHA256f57635f0173b4c6f4d8469c6b345800a33f1d91c42066d6ebca556f2425e6b18
SHA5125296e5b7e5eb33404d0b49c3659a7f3b0c1d64d446257aca058dd2b6ef377a6cc1d741390cafc6dc9dc816742bdc24510d1247643a14725fa20055c61d508cdd
-
Filesize
10KB
MD5cca3a20c8a5519f93b97d24a102e234e
SHA1b196e3894c4d503c96a3d93f9362c17018b07cf7
SHA25692d666367e5110a497fcb4ba85fa7187502390e7826d0fa27bd135d0acbbb174
SHA5120d8a26639dfb764be4c95c85400087f6517f7425f434aca719f25e1ced77ea73f8574ea5c22b3f74b4182268d6e2a88483d307d9fe8e107d2114564efc0de60c