Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
ff656117f222c8536c007c39c296df45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff656117f222c8536c007c39c296df45_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ff656117f222c8536c007c39c296df45_JaffaCakes118.html
-
Size
24KB
-
MD5
ff656117f222c8536c007c39c296df45
-
SHA1
6428cc550aeabf440c569f4cd1dafbeb0c3777b0
-
SHA256
85c4206d6a8717122eca37ea04533c69e89c34c119be639633a39ac663601eb9
-
SHA512
d03a7beacd4c4e105c4757c54181d063780ff7716789ad9b9c7121bf70d19949eff261a3740bc8e44afa4189089b170c205d774f5d4ee93a5eede03f083007f3
-
SSDEEP
192:uqN7HRb5nW7unQjxn5Q/fnQieZNnZnQOkEntFYnQTbn75nQeCJVevo7NtIFo+Nz2:nIQ/6ygcnnBN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 844 msedge.exe 844 msedge.exe 3700 identity_helper.exe 3700 identity_helper.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 2456 844 msedge.exe 84 PID 844 wrote to memory of 2456 844 msedge.exe 84 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3140 844 msedge.exe 85 PID 844 wrote to memory of 3232 844 msedge.exe 86 PID 844 wrote to memory of 3232 844 msedge.exe 86 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87 PID 844 wrote to memory of 216 844 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff656117f222c8536c007c39c296df45_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe69e046f8,0x7ffe69e04708,0x7ffe69e047182⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4060 /prefetch:82⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,13366995349408035649,3217743400819323726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
5KB
MD5346f01b253afbb872b62e842eabb5aa7
SHA1ac0b35777e6fec0e0816a0a04b877e47617f704a
SHA256ecf9f63caa50b66c43bae33ddd7fdeeb30e559f220c0030702970d354e846c5c
SHA5127db88c9e0dd32c5d0d5bd023b84ab381f4a2494ad770ba28982b330dc7cf963b2d8bdba1e5873c6d0e1956f2ddb14fe1dc89bc3829826c39b8deece20633dc02
-
Filesize
6KB
MD53b0607865427c320ef3a8377471b7bc4
SHA1e0f7ec0dc3a54867274ba3a08bd3726dd5128bbe
SHA2560ca523225796d8b3f12814308a761681ef2fb6e4eccaaa9955bf58207695eccd
SHA512304d1b14dd252e1900b55b32bea16a3f857c480df609997cbe1ee00f550936298c7d264b9ce486fffbdf93b3ae25b66eea7cb9d20f2f111a68b3073754ec4f24
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD58261c7594bc0db15dad6fc6b15a76b5f
SHA1bfb68546a33403c2e75a7c268ff85d4cc349e402
SHA2561706db752bb353d7eb5506f980b9bd92a2a0b3c40427e0b25b436fbf8d200dd5
SHA51224249af2d4454035e361f81145f25deacabd01238e5a283fff81afc485b2e2c1c606db8ba37a5aaf6fa7ae16faa99cbf1adec55677fd4a3de855b6402dc18364