Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
fe008de43f814d4d846fcf5df30c1126_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe008de43f814d4d846fcf5df30c1126_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe008de43f814d4d846fcf5df30c1126_JaffaCakes118.html
-
Size
4KB
-
MD5
fe008de43f814d4d846fcf5df30c1126
-
SHA1
2b95000d1d184ba4de6126b09a0fd55cad5ddf9c
-
SHA256
569e3adc9436346f29d217dd595e4a48d78afc89114c7584f2717bd50e86069b
-
SHA512
786e885c6c464932bf7a9c9fb507c48ae8468efe6ce11339cecd4a79d810beee2738c8b6e60daaf79123fbbdff5aa6b14a75867fd5bb2001e27e3149d3408b4d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oQZ8B9rd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1328 msedge.exe 1328 msedge.exe 3860 identity_helper.exe 3860 identity_helper.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 4588 1328 msedge.exe 82 PID 1328 wrote to memory of 4588 1328 msedge.exe 82 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 732 1328 msedge.exe 83 PID 1328 wrote to memory of 1876 1328 msedge.exe 84 PID 1328 wrote to memory of 1876 1328 msedge.exe 84 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85 PID 1328 wrote to memory of 3260 1328 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe008de43f814d4d846fcf5df30c1126_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34c46f8,0x7ffcb34c4708,0x7ffcb34c47182⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12829510084682351889,6576115570769549750,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
292B
MD5d1114bf1f1e2531ae7f387634d9529cd
SHA1cc11c56df88d21eaebd7ea03a9fdfa98a4a5bdd5
SHA25655f11a0f7ddd2288c8a88817b390b5b6d31734123f94f38d1ef29d2eb718b4bb
SHA512d159e3c9c1bae77fc70dffe3f81dffab19c17b24ece9ed1675f722e0295bad2c42f3a7d31c0f84e8e76cd4dff4735b253777699d3f82c4266d72ad6633b0b027
-
Filesize
5KB
MD5216df8a22959547e770a2618df37a80f
SHA141d0424dd1aaa993b3c5f5a87d22b672fd383ce5
SHA2564bd1c45dfe07f690ea3b5ebac20925276843419ce20dab5268edd81fb5d61a2c
SHA512cf60338a763d16e7026a238ddf309bbaecc25f45545087c6b8bcfbfc95015b943abe6b0ffddd72328cbb60035e737455a2115669e3ffdc2d44033cc557d1eab6
-
Filesize
6KB
MD5e9a08fad36671a65499109f94c27c666
SHA1e94975b744c911e28be0deae11dc501e3771b6e4
SHA256e0988a6220e3b7615bbf00ae33f6518da7e4e1fce3dada0b8234a6a22cffdb52
SHA5126cf1e2813e8b372bb16e44e853ef83e128c2259db8fc63c0fc0009f354d757a7f2d41433cfa782848fa3affa7bd1e7b4ee8da75ed252d32beb967319bced0416
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58d67b7734cadbbfa636f1dff89e80946
SHA18aba019405b5f7a64a9b3e455034f66958cdc390
SHA2563b9115719566001266c241c49df21dd941b73ab8229d95c89f408a14e535a532
SHA512460209d439c8674e3134693a28e7fdc38eb35bbec0f33bf6c10ea9b650272622298929e4f2e5d9824853cdb86bd4cbe20fc171177e9ada29ed27be5e989226ab