Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
fe879fc8ecd584d66c0cf7ad5e19f625_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe879fc8ecd584d66c0cf7ad5e19f625_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe879fc8ecd584d66c0cf7ad5e19f625_JaffaCakes118.html
-
Size
66KB
-
MD5
fe879fc8ecd584d66c0cf7ad5e19f625
-
SHA1
715ffbc698c6878ffb71cdcbbbdd4f27fe001f44
-
SHA256
3269afb74f2fdcb51a3b55586d48334f5828cb6e7bb7a43f056ae5cee436e2bd
-
SHA512
9016ba5c26bd40db75bc3ad2121f8b75c87c00cd2c16653a9c2b3fc27b45f8226e1d7c573b83bbae66e05704fa3d94384d476f027312808d8f4c6a3d4978cc96
-
SSDEEP
768:Ji+gcM0St8tN99OIskqLjLx+jwoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/i:J0+GUJTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 4680 msedge.exe 4680 msedge.exe 1204 identity_helper.exe 1204 identity_helper.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4488 4680 msedge.exe 82 PID 4680 wrote to memory of 4488 4680 msedge.exe 82 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 1564 4680 msedge.exe 83 PID 4680 wrote to memory of 3476 4680 msedge.exe 84 PID 4680 wrote to memory of 3476 4680 msedge.exe 84 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85 PID 4680 wrote to memory of 2184 4680 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe879fc8ecd584d66c0cf7ad5e19f625_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9991f46f8,0x7ff9991f4708,0x7ff9991f47182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,27200795899808246,15981758821874828170,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5789bce55752afe53a40c8a5c5f7dea45
SHA113da4a9287172bcd560c3951c125f81b46467a9e
SHA25663b40b2d35fbdbce2d678d289ea8ecd93d9429f0611b256d21d9eaecc1dcc43e
SHA512a4e1ee6bd387272f23f20aaa5fbbfd040704e0c7c4e99a4e917023ac90f812d43b6cab6cab638b26972f0f522097b13e493447dd99038fd8de750a95f1c384a7
-
Filesize
6KB
MD5e5375efd38851113050618621a735c35
SHA1411072e8e5b310df826d45d9517fb605ca78338e
SHA25624c2361b950dae579bba36baa7ee98622a87b9ba0a43106a71112bff8a060aaf
SHA5125fcd516256b0b880f4d81fad9e1a7e7b6494bec4cae9d211f064fea9efe2f2e4c63e3fcad7192bd54634366d76aaa741dd36c91ae27073528c0997161d95d4ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD529f17a83d55a9deceb4e992d3f6c07f5
SHA190cb5afd41e809e754bf1e91ab6607fe88a5b141
SHA2563ddbc76c280e342ec493cb5749ffac85d7012d82ea50647677bdc598118adb82
SHA5125e4ee01531edfb34a68ea9caaa11930e0c6f019298e809e34e175e6cef066a5ef01010bdbc80888caa311c3151571fccc954f36be31161268e10a65a878ffb7f