Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
fe5884ccfbc5771e32f16bb9f45f541c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe5884ccfbc5771e32f16bb9f45f541c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe5884ccfbc5771e32f16bb9f45f541c_JaffaCakes118.html
-
Size
35KB
-
MD5
fe5884ccfbc5771e32f16bb9f45f541c
-
SHA1
b6ad13152ff2b952be43d6d53a7f6e85df1c1d13
-
SHA256
a9512482edc7d00044725df47bd933bfef4129fbb772f7aae0f87c986c4d0cd3
-
SHA512
d9905fc0b9370a71782a6a0947c8f1565aacf4842b201269454e5accf1cab62d26d783a16edfae0c69e5c79e15c1df7bbbf67ea1616d76cfd7f4a2bb700cd687
-
SSDEEP
384:w4s+uO8FI/MHgdgp6kcKvN5B/Ch9s7YJm1FMs0nspesrYRglS48LaAeNN6ZtcbMo:XCFI2p6kcKvN5B/Ch9s/hr5S48LE7XDl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 2232 msedge.exe 2232 msedge.exe 3152 identity_helper.exe 3152 identity_helper.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 5060 2232 msedge.exe 82 PID 2232 wrote to memory of 5060 2232 msedge.exe 82 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4084 2232 msedge.exe 83 PID 2232 wrote to memory of 4636 2232 msedge.exe 84 PID 2232 wrote to memory of 4636 2232 msedge.exe 84 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85 PID 2232 wrote to memory of 1228 2232 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe5884ccfbc5771e32f16bb9f45f541c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90a0446f8,0x7ff90a044708,0x7ff90a0447182⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,17940674338253147350,16185127716372439979,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD51c16cdb769a7d431b2adc6db1463e217
SHA18260c48896b6c27bb36f2397bfa640a407856db0
SHA25625a5992b5c3d23130d9bee14245bdf955c575cda2ca5a12996f1aed1ec52eda0
SHA512f0c0cb2740771d07f45fe11e8e147f31cd0e719a615c98adc8eb37cec765db80a83c0d7712f5170c41aea6f2e338f363dc92a766c186b54b5b08b588fc792ae6
-
Filesize
6KB
MD5f853db0e777b90a3d2e4180415253672
SHA1915b694af26869d375be7da020b14d8f3e4e05cc
SHA256ec0e258349318abcf7e7588f22cff0f097e20c5f29002fc635af198ed7661898
SHA5126cf80005ab6e7ca4106a26cc87ab8b7520c7ab7c29fa75fecbcc1a940b8ce7e3dee880cf8cebec14401c35656981a906c4de67e9cf71f558d04f63b4782d232e
-
Filesize
6KB
MD5153933e673895e46c209a0fd5626ecc1
SHA189ea7f299d1e407b05a23f9368fa5a9347c8e5b8
SHA256db2e24b7c4c2eda15ced4e472818063ed431ddead62c8dee9dc22bdd48b8ab25
SHA51268ac660546c429737ad815619ad40974ca350592788b98139519f4f5e2f7580850208728a2399aeee2e690213858e667a45851b4de68e2b470d75fdede2acd70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b5a0ec037b796429510afd411fe1d4b5
SHA12472b9d03f50e3d7d2c769ddf88967e93b3ed789
SHA256b2ea6d22cbf266177945598c770323bb68942ae0ed17d62bf14435a78c11c43d
SHA5125d66a656700624cc65ae0be6c75d9a56cd35aadba19d4afc5ab4952982749b4e4182598ee78242cc31791581fb59f1183a436f48417abbca1d9dc02f14340769