Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
fcfd0e7fecf2adf4f9e7c01d1566adcb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fcfd0e7fecf2adf4f9e7c01d1566adcb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcfd0e7fecf2adf4f9e7c01d1566adcb_JaffaCakes118.html
-
Size
124KB
-
MD5
fcfd0e7fecf2adf4f9e7c01d1566adcb
-
SHA1
d21d2c8fac356e419aa1463e9941eb0eddecbbe4
-
SHA256
9bf1d02390848e51641e010b684089ea273ba4627c7f9eb11ad1ab5c1abc18f8
-
SHA512
ebb570f22e50e4726acb21aac6506fcd0544c606adfcb48a56ea12a8a70e4b2ba6521c3fd8e86e37d48857abcd2db8500b85bb98f21d239a6586e9dbfe313375
-
SSDEEP
1536:rpE637JAkopgShPOd1k/o1Twt6Jw/WlNOVjAJmEblqfVF9:FzNScd1Y6JwC4VjAJCVF9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 2592 msedge.exe 2592 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2152 2592 msedge.exe 82 PID 2592 wrote to memory of 2152 2592 msedge.exe 82 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 744 2592 msedge.exe 83 PID 2592 wrote to memory of 1768 2592 msedge.exe 84 PID 2592 wrote to memory of 1768 2592 msedge.exe 84 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85 PID 2592 wrote to memory of 3480 2592 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fcfd0e7fecf2adf4f9e7c01d1566adcb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffade5446f8,0x7ffade544708,0x7ffade5447182⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6883788018067856137,13021504122638549412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6883788018067856137,13021504122638549412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6883788018067856137,13021504122638549412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6883788018067856137,13021504122638549412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6883788018067856137,13021504122638549412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6883788018067856137,13021504122638549412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6883788018067856137,13021504122638549412,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD564bc056c88e0d0c40045d1c1ea18ee6e
SHA1b1e38fd57fc5932c9e3277db54a3767d1c307efa
SHA256a94f6976e08edfb20bbdde777357949d310e80cfe8e6687eedc35bc18f2c2296
SHA5120161143edab2244fe7d9437dda29f12f4680021ac49b30287ca688a181907720d6a401e5456bf7cba3dc85b71651b12539e2f26ea5237a74eaca93478c440fdc
-
Filesize
1KB
MD518ba40d78aa8bb2fca5f239305eda7bf
SHA11da004ebbfdb77ab9d4f90c068ccf86ee20d0150
SHA256ef9a35303cd066d57544bb99bb816482904becd5ef683db0dac5e3fb00e77e94
SHA512880fa656326d86b1ea7839b09afa5caab657eb7bb7c170bea2b443237dd689f06826631a712109240eac7f8f54d2ba6c535901c5df951a809d959ec0153b2f26
-
Filesize
6KB
MD50f1ffccde95e3745fadffc12e29a9f71
SHA1efbb857a809a4035815a3de857bfa13f102b94b2
SHA256470c5a33d0d3c3d93d603bc746e68b25ef75fd2bf80fe3993d8fed282681b679
SHA5120124e591395705c6612f12d8d6181208aa85d87a2bbfbbf8b88037c5db605575ef6156fe17e766dfec92f20b8adcf937a2e083d7b4781871c91fba1e122dbe44
-
Filesize
5KB
MD5d562f3ac2786ffcac0631dca9fecbbc2
SHA10ed3d343e5808e329ac33b5379935e42802f1f51
SHA256074c866ba5d316d511425667e030e241341d0590ca5cf5a0f73b1371017445cc
SHA512cd05fa5c5f11522485150fe8dca7dadc9bba2ab68df359276db1f62bc18c096381b89e276c6f33a93436ffd6f4665c4fd1c62dc0ee99cbed243992166e0b2e0b
-
Filesize
10KB
MD5c6c6011f15b95467a5c748ed9a5b8679
SHA12b9105a807e6cc5c74a8f9ef6ff139e2ac7f5338
SHA25607d7a8578208404f6d0899708f1d77a99725b814e7fe9703f340b13767903da6
SHA51255e0ed01b0a398374155b03e5e596f03575d275b31cd3d884c98180b76054e13eb4456215b4456aad87f41b808d310fad09aec628d64eddc0071d1d1f69638e4