Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
fcd56f290e56e56581672a478cc86541_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcd56f290e56e56581672a478cc86541_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcd56f290e56e56581672a478cc86541_JaffaCakes118.html
-
Size
134KB
-
MD5
fcd56f290e56e56581672a478cc86541
-
SHA1
0286c03d8d779b7a674ec65c1efbfe81efddad95
-
SHA256
b9413f14101041e433c510a316701fed914b4034da37aa6a55d31600cbae58e8
-
SHA512
6266a590e221cb9cda0cb50fa4b02e8929c18783686fc1d6761dda3daed47f9e20f202c2207c4d0a3d5658f99522dc5bfebab6e3b69235de9936686f69a3977b
-
SSDEEP
3072:Se+TJdbCSiS/5a30yfkMY+BES09JXAnyrZalI+YQ:SeiJdbCSiS/e5sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 2204 msedge.exe 2204 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2624 identity_helper.exe 2624 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4868 2204 msedge.exe 82 PID 2204 wrote to memory of 4868 2204 msedge.exe 82 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 83 PID 2204 wrote to memory of 3040 2204 msedge.exe 84 PID 2204 wrote to memory of 3040 2204 msedge.exe 84 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85 PID 2204 wrote to memory of 4476 2204 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fcd56f290e56e56581672a478cc86541_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebc3c46f8,0x7ffebc3c4708,0x7ffebc3c47182⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4050352672779123269,8697220746918177407,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:2748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
183B
MD56b8e56d12e702b21a8ff8be007174c4f
SHA1fad32f644c24c905052ec84320220390ade4f1de
SHA2568329dcd7ca42ee73a0a780555723da2b34a9fe01d240c0e2a511dd7872f172a0
SHA51209ae2887f527359111dc8dda1fa16dcb47afb2cf7a28027b2fbc6ee75e0c3346e15b7d50c3a67ad2aa67c5ceb7aa46373209f606675ccaf7c4b8d741e6aab99f
-
Filesize
6KB
MD590b50ab60bf167801395bd4ef70d64ca
SHA19cb3aefc98200b7121066b330f9448b7968246c3
SHA256222d9f0da5740a66d2eb7b42078b6937e6e0b51989345c45a0f27c86be4bdfd4
SHA5123201b29cdf3c17853057591870a2dcbab254a0998f094b4a937ca66aacda9f2ce363b9481a21cc8f8fe6885eb16ebcb4be0012edacad2ff8055e1258cd6dbdf4
-
Filesize
5KB
MD55f00b6c2471c7dd2a1248383bc3f014c
SHA1c5a9628878ed14f9f7f73174908c8f88f8a9f774
SHA25641423b83e4e39d4097e9b3b99a3f5f2f4bff145d620e5dc59d5ee19d2c4e7db0
SHA512d9078e5567da0b29e4bb57ed2c6c160576cb2a9e35fab59a5b4677aaa2961e691c5a47ce8eae58de0ee546bee90d794c1d45a6916784d07cdeb32dc3765cf839
-
Filesize
6KB
MD53c5390d5e9ac404cf948bcadef06dd72
SHA13c9b7d680b574a0c5ea099d7cd3e10b58332fd8f
SHA2560f7b004db0d9da1bc6aad5f6be317c99a049856b3f0c7e255ca20b519e8fbd47
SHA512b706ef9ef93f33bc894e9fb1be599152aad216cca8bc40a546e5c9100d89790fcb5f0bf61ca4a3edd201c7263bed99b94c2f8bf0d8be9d02ae40472353740a8d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5db6b60cd315c24b4dea379cb0e5f9dde
SHA1da009ff1aba4a0b986f3ea46b82ad3703f10f1e2
SHA25657c8b00451b6afedbb0544d27f924a9b791820b191618cf4835ce39f3467fc30
SHA51204ac8dafc08e1c930f1b6d119a2c847410957ae1cf13e7ab0374038deb01425c3702a01eec2061cc9e7f9112880a1b99f1f3c0f37602d6d04f9659a2bb816f34