Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html
-
Size
4KB
-
MD5
fcddd59710017ebd653ce9cf861d400e
-
SHA1
613e28508290087954c36587234ec9e24115325e
-
SHA256
bb1fa7e6430ba560dae3a82326b815b12ab972b9e79da70a2338ebd991dc76c1
-
SHA512
6cf2770e59114282b80f130ce278ca2a4ffc7ee7f34a9adf7ce1e064ab89a135b524bd4f9f3aef4155b67bdee2332cbe6b110ca93ea9e241fadb05175c94b79d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8osr8g8d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4456 msedge.exe 4456 msedge.exe 3668 identity_helper.exe 3668 identity_helper.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 400 4456 msedge.exe 82 PID 4456 wrote to memory of 400 4456 msedge.exe 82 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 996 4456 msedge.exe 83 PID 4456 wrote to memory of 4632 4456 msedge.exe 84 PID 4456 wrote to memory of 4632 4456 msedge.exe 84 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85 PID 4456 wrote to memory of 3216 4456 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4c846f8,0x7ffab4c84708,0x7ffab4c847182⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12519522646370168313,8361803243978719588,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
292B
MD590ae045737f359bb3e92c91ef46bce8b
SHA17eb359435fe0dfcc72d8890058ceb2a6ef170727
SHA256a7e267700a3ebc91bc77842f3b20a03e7392450ea83232bf072325a62d3b17ab
SHA512b6ee96f8caec9bb77eca328a072cdfeaa2e089794c4e21f075c66c9aebfaa432d7a05eb1aaba33d88f04a6af336de64d0076d12f1dd690fce8d2c5530d36b4f0
-
Filesize
6KB
MD5d7b360cc1f5ebfcc5815264c503992af
SHA198b98590a9c9a715199dba14446545e22767f5b4
SHA2567ecd50fc21353d7ce4851c427fe88dc8a2310cc817fb240792641339e53bf3c8
SHA5129e417f51ca411f6657841329802980612cb4f7d17d5cc915bb0e3ba4141cebcdf24aca5d59f85aa0daf7d730105022f8551d4ce3acf3b629de1893d06a7e7b2b
-
Filesize
5KB
MD5b0aa9caa734ebac9a351602d59ae75dd
SHA1186a8a8e7a6d5846afd78a261297e03a8d3b4942
SHA256d9b3fbee5ca01581b2d4643a7ff94ab0130ab7db35ecf66c8fcfb43d92f9e23b
SHA5128ac4d4b4ffe060f08439f366cf1ced05a4bf01ac4bcea08e3e82673bb91135ac95864bbec8146c7d4bcaebbecf744fb4c6b97986b1723497f7fc4696848e9072
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e44d3749e90e384fa14e469471fddaa1
SHA180b5f787cc9b709103344044014a7270f3644435
SHA2566b1ab2bbcf161812bce23a6ac340fec9c79eac8ec0235de617f9eb32be92e4d2
SHA512b00df14d0416d1425e7ed67d2497607c167caaaeb3578e4fa463af8361c7b16d2e0b9f5e62f6a1101ee14cc864bf2c040d718dd211482c9126068b426eda513f