Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
fdfa00363e2439fb45d01bf0225749ec_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fdfa00363e2439fb45d01bf0225749ec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdfa00363e2439fb45d01bf0225749ec_JaffaCakes118.html
-
Size
60KB
-
MD5
fdfa00363e2439fb45d01bf0225749ec
-
SHA1
3778170e6806473bbde231078bd77470fe013e12
-
SHA256
b5d4087eda59581e737bbe4b6b5058a88ba22c8fbc9ab0204ea0a51ce2c8abb8
-
SHA512
c9a9aded5589153f0d6261ba5c659865250b073e7765e07d7c545a1d4037d0e5bad62f2d8df132eebedbc4121e9c47751a473d5a86f8ee2bc441a440625233bf
-
SSDEEP
1536:mDzr6g/YBSrtDIxSvG3/xLCIt2lp6ZDqKiNW/c7KLeFGIl0:ar6g/YBSrtDI9ZWKiNW/c7KLeFGIl0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 5004 msedge.exe 5004 msedge.exe 3048 identity_helper.exe 3048 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4816 5004 msedge.exe 81 PID 5004 wrote to memory of 4816 5004 msedge.exe 81 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 1040 5004 msedge.exe 82 PID 5004 wrote to memory of 2344 5004 msedge.exe 83 PID 5004 wrote to memory of 2344 5004 msedge.exe 83 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84 PID 5004 wrote to memory of 4412 5004 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fdfa00363e2439fb45d01bf0225749ec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83d7446f8,0x7ff83d744708,0x7ff83d7447182⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2412 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,140455598320774661,10335486651284907705,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
701B
MD5b8b17997623764651859ebc01f8a65e1
SHA1d85222fd7e1e1069ce5b811de98caca1a9dcd5c0
SHA256c20f650928e36516bb5a26e0372c501bd726a722cfa2e8e2055cb96174f7c5ea
SHA5123227b54d8ce7444d9cba46fd2d6fc62be167e9a95c970f065afc64bd7c30454962ff0b7d8b60350aec687f0eab408f6ceef10173eb1649b673d00bfc00374e4a
-
Filesize
5KB
MD57874fcc4007309737313a6519382ddd2
SHA1b8b94ceb6669e399bac01a70e6d7ab4844c22e6b
SHA2565da030180c7707a7516cc1a2fb10036b94675443e8c5e1518025668fa10d5679
SHA512bdc0dd4baf9d3a12dde53ea05b2b2f9fcd2c486ce421519494de856e7f7db57c61b67c893c4e56cad2c2c8ad8785f591e36eaa95b3614832ac55c373983e8ff3
-
Filesize
6KB
MD5b0f58b2b0af40ce54cc937cb14572f92
SHA1dbd1b1e32c0cc2fc15789cc43c6130ce1c042779
SHA256606e27e97be8ecd6ad6d1997f96374d02447f812b269e3fd1f89ee8decf7d5de
SHA512c490e423a1290ff0d4371f3c3976d1b971065ee8c7bb1d039e1f61daf78967c96b622f3f2f60089c197c49e7680472530546dd92dc66b3b93156291fd59c55a8
-
Filesize
6KB
MD525bce0af41a63ce7a94fc99f26dce1d1
SHA1c6533c880e13fa85f1ddb9784614d5d8baf8f5c9
SHA256d215a8c131dfb70a4afe911f517263544a59f94a58a8d6c981ae5a0d879b2234
SHA512d0769bc44b9a5b869510ce2214d0b7e1aba0c736dc2491a908ce34b3ee1216ad6d3d17945f5ea79d597e3ba6db543a8972f3c45bc44a62b6425468dc69090dce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD522ad93a23e9cf11d6eeccd06e2913533
SHA1cddeb04e6ae3d549b80403afcc69488c852b55a5
SHA25645b52931f1d79bb73b6421a877f925e9f2e803e5ef0c1cfe0b49e90824cd4446
SHA512c8a723fd10ba26569bd6771794d8f38bc56c29f27bdd10577d5fee7cbe1bbf32f99c55d36e5f50a09c5358d922fe8081323f1f9bd59944832ca9b5748e470e84