Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
ff833a19fd97f894a3d13d64672a20b8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff833a19fd97f894a3d13d64672a20b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff833a19fd97f894a3d13d64672a20b8_JaffaCakes118.html
-
Size
33KB
-
MD5
ff833a19fd97f894a3d13d64672a20b8
-
SHA1
a9a9f28b079ed018121fc70ae2ff3ab0f83dd811
-
SHA256
ffc04c54e43c97afc64e37804960aea842d63d20ddd7b0f7acab06abff238cbe
-
SHA512
61b16519e9e94f7cf6023f118d80b27d07b8e944623c065e82c615d7ba94386c8e8d70cb256e9d3ad74061526d6f9305d607c87eee7d1aa080bfe85002f8fdda
-
SSDEEP
384:JS9hXDMkqx8HoMKSDk7wZm8hOKQGiEQFQAQk5oL2fWCowiZmtrX:JSrTMkqata/YrQGiQA/e2fWCYIrX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 880 msedge.exe 880 msedge.exe 3944 msedge.exe 3944 msedge.exe 4728 identity_helper.exe 4728 identity_helper.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2000 3944 msedge.exe 85 PID 3944 wrote to memory of 2000 3944 msedge.exe 85 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 8 3944 msedge.exe 86 PID 3944 wrote to memory of 880 3944 msedge.exe 87 PID 3944 wrote to memory of 880 3944 msedge.exe 87 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88 PID 3944 wrote to memory of 4788 3944 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff833a19fd97f894a3d13d64672a20b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,13122943138050428562,17312782249943826869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
260B
MD5666b79c1607f3eb58b7b1fca85469fad
SHA10a8dbd5fa4c9e35653c3ab8f18b9b648cb1f2d57
SHA2565f2a356bbc8ab3e379194d073a1487b3f361bc55e638121b98030f8e0370e17a
SHA5123ced5a1ac1b5e1a03172632f75431ee0b5601a6c4ad694099688b48e633612d6169e883431c31d28b28f274858b4a952f53fd746bc804fcaec5c1857248fe3b0
-
Filesize
6KB
MD5126e14ea83f15d6eb430f4206a50359d
SHA1bb324c6988faaff63e6bb815ba053ca4d9d14dd2
SHA25605eda4e5523a064c5489c80d48e8a47e3fd15f8dba98ffdfe61b326ba7b04824
SHA512f0cbceda048fce42e5667ae701d40d8fc79bf5d2f20b84f3bb4681421d7f44c646391619057b699b4ff8d76234c3c3753ed99ef41c133fbd2bc3853ecca4d1a3
-
Filesize
6KB
MD50a3ed50d322a001b82878963c96704cc
SHA178c89f6d5d398a685695e909a4bc2d5848606c36
SHA25664edf64a0d43ae3dbb0f30ccb969b58e15fd78f20c458645a4ae2290e8e2e5de
SHA512927d3b27aefa960c76a2b30a19a7346ca5327b56e005749a139047039531973978f36129494eb882b20a0b77436f19b126b043eaf44d95b69ce316ef66d1c537
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a79be4f4034b0aa3e44d3b3cf9c36415
SHA1d1a31beec094dcef7d91aaffaa4005e48beedfa7
SHA2562fd77535a34e87a41e66be6e68c454f610ded4a1279f53a27814893d26c62cbd
SHA512d8406f04024e36a7e2f663455993c3ddb8d250dbbc2a0c287818b5a795d997518402aac2aca71b1e42eb54d8f15469d785e3c6a6e5f6dade20658d73d31c4356