Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
fe0b497936d7c2fcab88e4cf64e73cde_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe0b497936d7c2fcab88e4cf64e73cde_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe0b497936d7c2fcab88e4cf64e73cde_JaffaCakes118.html
-
Size
73KB
-
MD5
fe0b497936d7c2fcab88e4cf64e73cde
-
SHA1
8e520d922bf3bfe5815365817a026917ed3da2c7
-
SHA256
591f01887318450e64e538aab075c2a837e66e1aec3b3016492d74db5c1e22cc
-
SHA512
eb6b593d7cf6fc772bec271b684c61dfe3335b5a73846de0c1fabbdd0898cde10880b2bb1316f1770c3713f0decbc9c7e0329b0ea6811ed17a5af9079f8d1249
-
SSDEEP
768:FqGmTIfymM5E8zAcBG7YatNhhOlZCno4zSPvydTOWPIF7K:kmM52tNhhOlZCo4uPqdTOWP6K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 4276 msedge.exe 4276 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 5100 4276 msedge.exe 82 PID 4276 wrote to memory of 5100 4276 msedge.exe 82 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 812 4276 msedge.exe 83 PID 4276 wrote to memory of 3548 4276 msedge.exe 84 PID 4276 wrote to memory of 3548 4276 msedge.exe 84 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85 PID 4276 wrote to memory of 708 4276 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe0b497936d7c2fcab88e4cf64e73cde_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff220d46f8,0x7fff220d4708,0x7fff220d47182⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,13354438912820503486,1201548109140197768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,13354438912820503486,1201548109140197768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,13354438912820503486,1201548109140197768,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13354438912820503486,1201548109140197768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13354438912820503486,1201548109140197768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13354438912820503486,1201548109140197768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,13354438912820503486,1201548109140197768,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD501fe406f055c5329a17ba1d441d79ba5
SHA118b14609528886297d3f7c98bd3b33a074dff30e
SHA2569a0409a3cfe3263f662c3629d3db0fc24dd98ebfe58c95e1f9b8d33fd14748f8
SHA512a4e2fb96f27189ef837e9d5f3c62e6853c32e4a00cc9ff22e067457662f16ef5d06aa51abdb000e55911489ed698346488325316f06acfd4ee94554e33a913d0
-
Filesize
6KB
MD511622f4d49ad0cd8e6fdcead95f5b891
SHA1f344efdb7c6bdd801f5c8d929c9c9bd99feed51b
SHA256a67131f03888792b463e6ece5a663739d713b3bd854697ee4db0b678ea781766
SHA512d78951c178dece79fe70c3c45ad93681d1b3d31c467fe98b5f655d1be11930322cb5ebc7272af7354f472115c6186eccfd650ee7732d481ff6ea32e8f522451a
-
Filesize
10KB
MD59b5e3990b5cf3ad82f38fe4cc784a488
SHA1366d5cf3479baf57c0a77c46fb7111eab2ff6030
SHA256ae0e507be89af1ebd810db78b902f5fcba38d49d54bf5bcb385b93e1219fdb41
SHA512fb437f5eb7de16918419e063649122ef1aac7d7ba38aa60c0b147eb29d7a982168f4a62ffe0364fb647013205a075f5813315bb37ad63cde3ff04a90aac3a53c