Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html
-
Size
461KB
-
MD5
fe4606efcc8e80b92e10b499667f77da
-
SHA1
d700679a10d73ea852f8e5a289cfe74a4f420f0e
-
SHA256
bdc6e61ee9a2a613ca134eaaec138b6dcde53e026f12436bb8fd91b2b2d9cc4c
-
SHA512
c2430fd0e5e5599f86031b5d3f3c0a84a7f80d6ec07e0e7a9512f00febb31a0a4ca8227dd9070bd5f6aba5520017239c0e1bdb7d646ec3a651d16c862da1816e
-
SSDEEP
6144:S+sMYod+X3oI+YdmsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:j5d+X305d+X3v5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 408 msedge.exe 408 msedge.exe 1076 identity_helper.exe 1076 identity_helper.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 3956 408 msedge.exe 82 PID 408 wrote to memory of 3956 408 msedge.exe 82 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 3768 408 msedge.exe 83 PID 408 wrote to memory of 4936 408 msedge.exe 84 PID 408 wrote to memory of 4936 408 msedge.exe 84 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85 PID 408 wrote to memory of 3472 408 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28ee46f8,0x7ffc28ee4708,0x7ffc28ee47182⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,15744481370377519016,9254471934407248963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD58d3105afeed9e908c8fe431ea828377a
SHA100244b77cf416f0599dc94bd4ead63227bc6abb6
SHA256ff422a0e7cc93037a90fcc200662f1f55a9adf64227a57466fd3fe1a2ecf14a3
SHA51247bc0b3af145e17d8f45cb6e17bc1cf6fb1d9ae55312bad826d19f2bfeddac02bc86d3b5a5ee18fa2a8e144968faa62366a1433efd501b3651785f7e36307c8a
-
Filesize
6KB
MD5b1dcf3952b9c9688b57f68f3a00d90f0
SHA15e059a7a317f172ba63d485c2391e753d47a30a8
SHA25685cbdfdc36667b6997aaadd8ef7d1c64d62eb052ecb98eaafc4cd8376f4e5207
SHA512f256153cf38904783d76fa39e5c3f9e812e677391ba1f47a9f28cb2ad7c27c94a11ae195a6b772a756193735c4a9a0a63d792b6e6c09497bdd1e300830f00d75
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD581720da20fdc74fe00e8d6b6f67a03e7
SHA15c43e221d7895e9b7474495f12696bd9aa2625a0
SHA256174670f08afc8d03f922f814ad79277ec133fd9833626cb1ee024677d89c1034
SHA512e3b2e18eb77bee21394cb1699cf9c7ea4d50c1c4dde8e761ad6acb1682a9444422c8f23ea22f4a74f2d80bd6d04048d018dd113eaca3bd6e87e2618876163b96