Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
fcf739e72567c24c57530f61a82937c3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcf739e72567c24c57530f61a82937c3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcf739e72567c24c57530f61a82937c3_JaffaCakes118.html
-
Size
69KB
-
MD5
fcf739e72567c24c57530f61a82937c3
-
SHA1
2e6e93f5579ac56a04f0a19c7204952754b8d11b
-
SHA256
3defc508e5614ac6e9aa2c7ae6f2319532bba2a3ead9a6d3e8c87040e6b37e45
-
SHA512
41229e31461a36779a0c8e62405f448b0bad7366aa2f1b940ee519d63cc061931413393e9a823d827af96e6b9edb702c1885afdef23e61ab9d6f9f43f0924a22
-
SSDEEP
768:RgOriWNcaSoagGzw2OqkqKhlb7Q3QlFY9McQv2UrZxL31pDwNpFey99G2SYv:m/lw20hxQ3QlFY9M68nLMpD9h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 1460 msedge.exe 1460 msedge.exe 1512 identity_helper.exe 1512 identity_helper.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3728 1460 msedge.exe 83 PID 1460 wrote to memory of 3728 1460 msedge.exe 83 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 4848 1460 msedge.exe 84 PID 1460 wrote to memory of 1964 1460 msedge.exe 85 PID 1460 wrote to memory of 1964 1460 msedge.exe 85 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86 PID 1460 wrote to memory of 3352 1460 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fcf739e72567c24c57530f61a82937c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae52946f8,0x7ffae5294708,0x7ffae52947182⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6836138322799167038,7943093691498473464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5f3676fe621c5b06eb00c43a52c526809
SHA1030df38d4bb7c6f47ca889868ee396287c801ff0
SHA2564e750726a6ced56fc65afed5e97ead9ee5dc37a106c0e58df86f8a060a3ea2d7
SHA512d5866dc4084a0533b977d347f882d9a3aef2a0ca7b4b36a8dc81b5bcdd7a7af2f424be1056bf6c70b200d0947ace07df95d90664822e39b69f7ad3bc44795f10
-
Filesize
1KB
MD5e5de35416a82d0106276bdd05d2356b9
SHA1bde5f5f9e12bff96d2ba9b19a277968c1014e1e4
SHA25616dbab7ce251d9dbf335633e8b4159581e08aca12a3ab1e664509a29f11081e8
SHA5125cbae2f9f25c3af6229a47de0e99fc4e6bea23b879ea83b10d0a1095ef5b87367ea7c3b14ed47caf4f33d9e7bc2de21a7ac8c86646aa4c29eadf5040566f21bf
-
Filesize
5KB
MD5075f6e78928d0cd76176a66277d85104
SHA16629e8feca7c287d57c46625eaf54d954c8a80f4
SHA2565b98902d0bb9b502712944b62cc3f86df26e89d7fd486f62ab7d86db1568631c
SHA512b87fb19a0aef1abdb54db967f00c91e23c9296fefa281768519d4fff57a6f167c8477397d2306de8e738931c8bdd4f155bde01980ba0e43804a49b2087be9139
-
Filesize
6KB
MD517ecf953fe5f5d36a6602f4b231341ab
SHA17ea6460d4dfaebc2ba6e28809409c56323baca4b
SHA256faaa71d23d6155b284ce3ff2df932bb04987ccc0520c3e9b51c2c881b0fd469c
SHA5127483e22441be865efcc1407446aca5eee3e6d9cbdff062e2a3946efd9af04dac275a1dd386a550deb1f099cf57fbbb3b416d04f9c8a231d710ced3a0f14f6490
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51a98bf1175006a3144681730058c83c5
SHA1f04a8c962ee6d56b024c9913aee47bbcc965dd3a
SHA256c165c2d308e1f881ed5fcedf0296bd56a0b01184d5919ea3c7c6b5ac45faa0ee
SHA51265c8fdb2d095f3f9a07a19c716b99821ea29a4fc3a1a90b2ce9c4a63529081ae1502040d33b4e9fc32e6a33c15a176189046293071415e509f1c7d486e37dfaf