Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
fe96ab972bbcc07f74ea990022280782_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe96ab972bbcc07f74ea990022280782_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe96ab972bbcc07f74ea990022280782_JaffaCakes118.html
-
Size
49KB
-
MD5
fe96ab972bbcc07f74ea990022280782
-
SHA1
f54f4bf0e9c7fca17b91c6c2b86bfe2320b60100
-
SHA256
2469b6e740a4d54d74dbba6d6c1b0436dcc2d13c26dbaf92b5f9da0dd6ae94ba
-
SHA512
eb9a0fa59f05b6c61dcfa4f1199be0b618d4909a5a8b16157646d487a5f3679d94435dbb05097e7be2f8a750723d09b773bad60966774c20d6febdecd7dbef4d
-
SSDEEP
1536:SdWkaYT//6snzNm9F18HR/WfsnzNm9F18HVAvCU1e+7mwMN+qnlfe4h2OgVT0icD:SdWkaYT//6sn4c/Wfsn44+7mwMN+qnlh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 4244 msedge.exe 4244 msedge.exe 1504 identity_helper.exe 1504 identity_helper.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4740 4244 msedge.exe 82 PID 4244 wrote to memory of 4740 4244 msedge.exe 82 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 1588 4244 msedge.exe 83 PID 4244 wrote to memory of 2948 4244 msedge.exe 84 PID 4244 wrote to memory of 2948 4244 msedge.exe 84 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85 PID 4244 wrote to memory of 556 4244 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe96ab972bbcc07f74ea990022280782_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34846f8,0x7ffcb3484708,0x7ffcb34847182⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1984 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5210839405137512355,566005730391074755,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD52801d1d2c41dbbeb139902df6d0a3b52
SHA1973b4674e20f91623beaae47e72b3aaafcd92a46
SHA256199191262f509f2206790df164131fc1d7125caafa16b41813ced1dde3dfe36b
SHA512362faada6798700b8b86585897fcfbb23eee7520f84a6747d98e08019737fb5d24f71eb75a3859a0d0b24890ffdaa0e623df021321fc9a0c284ba8f96228425a
-
Filesize
543B
MD5fb5eb843c5dd8eaf7c25583325bfa09e
SHA138c6caec1c7002c7f0f487961aa1d0bc64d3d80c
SHA256d97b692bcdb8b14f1d581647e1ac831ba0619eb589ac688608a8d87eb7b1c7a4
SHA51271a8a46ec5e84bf211b76a29ff7ee07a64ab5314456dba812f305b6563f1723d6b829a65ce6c7221aa19a791981c0f4b7d88ffa1059177eec63ff6df1a9e6d9e
-
Filesize
6KB
MD5eb370d602b7e0747c94b28ef942f944f
SHA14b57c5b9b2d5f5877b9394742af25c081ca4c853
SHA256199a6252aa161d7cdee84ce350f43461dee6ac7fdcac39b6abaf038f77720ba1
SHA512b63eae1f22d55fd2e00872fac4059842c04858946986b83fade96661e95fd9c38c3ff610c288e1b3798747f43189d97489c0b422a409108b31a799ece1cd6a11
-
Filesize
5KB
MD566faa2e505e5e4d4e8011906de42b925
SHA1ec602cfd2c7c2b7c4cd0551431dfa4bad5810fca
SHA2566c4084faa6db77adb9c0d61b60b09463add6e141d9f592df347c340ca6207cb3
SHA512523fe63d9ecdd6d8a60f25230b7a48be9e007ab5186df176323ff2ce304a87033c6f3747a452f785a5b476e534cb9ebd842d13978eae7dcf2debe936833af9da
-
Filesize
6KB
MD578b69cb963ceb690d3b5c188fe877841
SHA1f4419c09a9be2fbadeb4f600f8e02f831c9f90da
SHA25623316de656c8b202a7426b9f2d8ee09ba5783b66a2ca36e16e5ad962354af6a1
SHA5123cf1272d08065154aee462a374a4b816f4adc982b582fa4f6b1dbd19efed5052aadbdaa12bb9b7a80cd5a98170f2d1564da72bf5b5cc79ac1ffb651f09253fd5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD594e923f4a5fb5c794c6fe290432e1e35
SHA11c72dd627e79897c9c1e741574a10b0af6f8e434
SHA256d0a6764ac8bfb03df8b0f3afde37cc1db65ba577755cb0fdae3a510550693618
SHA5126c93404acb1a96855f63f4a133e83dfdbe1d24d4fb831edc2bb3c0cc30973afcf294d0e2dc4bdee895837a4416007e83978e80570fea85439428cb31a4463b84