Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
fe71d7a48c9e9fcde8511c3ee780468e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe71d7a48c9e9fcde8511c3ee780468e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe71d7a48c9e9fcde8511c3ee780468e_JaffaCakes118.html
-
Size
53KB
-
MD5
fe71d7a48c9e9fcde8511c3ee780468e
-
SHA1
c538b22bdb4266e8b2e9bf4492245c51688d1120
-
SHA256
1440e5dfb43361c5386fa71fa13790a7d2578923d038b8ee43217934efed866c
-
SHA512
bb8ea2405c1512c82637e3705a7931968a715cf67c307f1154209c9da0c2970d454570e136ffe2ee4e5a9931fe7a9cf3e0089afbb9ee3ee8d49a8e85bfd34bbd
-
SSDEEP
1536:CkgUiIakTqGivi+PyUurunlYd63Nj+q5VyvR0w2AzTICbbco2/t9M/dNwIUTDmDJ:CkgUiIakTqGivi+PyUurunlYd63Nj+qI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4972 msedge.exe 4972 msedge.exe 3296 identity_helper.exe 3296 identity_helper.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4528 4972 msedge.exe 82 PID 4972 wrote to memory of 4528 4972 msedge.exe 82 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 3636 4972 msedge.exe 83 PID 4972 wrote to memory of 4748 4972 msedge.exe 84 PID 4972 wrote to memory of 4748 4972 msedge.exe 84 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85 PID 4972 wrote to memory of 2364 4972 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe71d7a48c9e9fcde8511c3ee780468e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffbc5b746f8,0x7ffbc5b74708,0x7ffbc5b747182⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4967507523645563649,17865822990066736612,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD547820f2bb7deb79381e2c54802b3c730
SHA16603865812013a4b46fab363ba3d4a5e07ab90b7
SHA25656c8f27db61e28fe7ce46ef740aa965b58d3c59fb599c12023a8768917a2ba36
SHA51247b4fe5499ad758e811a24527aedccb51a5966496303b604a75d4b4a483a5bd97a0ab89e1b43ff07b90bea51148d19ec84aac08313786b2b455d56f707c4c8b7
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD5056968a255b4e174cfe92e01ab97207b
SHA19b29ed08451230eb22f141c3a1dc64787e851f74
SHA25607ca5ddb64a9b6b896b38c8f510c24f85814420e6d211fdbb1cc466f6cbd8cd0
SHA51252922f2151fd19af2a78c17cbfbb24f918e0892a60dd1bd7828ead2f643e3b6c665fb4a30d830e21572d22a0924aab22c230c7a328c0e70f0ced4c4c205d13ab
-
Filesize
5KB
MD5cb7e803055d8737fef17cdd69e016f56
SHA1a819a766264faabb41f1c48717c5661da1456c22
SHA2564c129371257fe359723fb247aa0258e989de7729351210d67df43749e05ab53d
SHA5120b5c1fde4bf5e69626c43df01537006c57cd02b526ee09938969ae06a67819d166c2c6acdea2e55090941150976e9ada6d8d7080449fb5adbd52305b161f6138
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389