Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
ff00d6033c13f7f5c65e9c1fb929e602_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff00d6033c13f7f5c65e9c1fb929e602_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff00d6033c13f7f5c65e9c1fb929e602_JaffaCakes118.html
-
Size
30KB
-
MD5
ff00d6033c13f7f5c65e9c1fb929e602
-
SHA1
5036ea085a98369b986f93c0df0930fba17ef088
-
SHA256
3f6d6ed550d10487efa5aef88017851e5845079c0439daa11a0b3ed79ff44935
-
SHA512
f202153a0df7e294bda43a832ae72cd011fa5c78f3447df2c1ebf08d23c63bc9b4a2fcbff93dea9534512726c7186f2b423d27674164efb74123027cfc6adaa7
-
SSDEEP
192:uwjBzb5nznQjxn5Q/InQiejNn21unQOkEnt4anQTbnFnQmSIxlsOE80DDXje9yyW:UQ/A1Hrxl0DOKB4s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 1944 msedge.exe 1944 msedge.exe 3068 identity_helper.exe 3068 identity_helper.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3412 1944 msedge.exe 82 PID 1944 wrote to memory of 3412 1944 msedge.exe 82 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 2984 1944 msedge.exe 83 PID 1944 wrote to memory of 4764 1944 msedge.exe 84 PID 1944 wrote to memory of 4764 1944 msedge.exe 84 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85 PID 1944 wrote to memory of 2936 1944 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff00d6033c13f7f5c65e9c1fb929e602_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd77346f8,0x7ffcd7734708,0x7ffcd77347182⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8553055652686673505,939627872113430044,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD5d9e5854c4abf6d6c9119fa6516e10e20
SHA1c57e5f6c90237b6a5ecf70019a505f73e1cec8ae
SHA2569836c96e8fd97c32ba68cad71825a5e2226a049f42c1d7deb01ad07790400074
SHA5128aedecddb0d42ada31a43312acb5d469d1ef06a03eea6dcd2cca24d1db0981e843c9be53883a950da18a3f3a421ae162bebc2fb2750bf57da4d7829d2c934210
-
Filesize
6KB
MD57a55a8e569460d493c1d6ebbcbe2aeec
SHA121a001fcd073d0d9eb4ba40e7a6972ec51a9c9eb
SHA256a8ab5242a523a0bf9e025cb50e65df4a3c63b60955bd52774ebf9c229e885767
SHA512978f5fa02887d495bdef45930544b02ff168d46e20767263a6ab6eeaa2233845f574cef238b795fca268bdc5af914cd5656cba42b1561ca5c1fee1b260e73333
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5776c0cb5de9682a3f1d16d0a412eb4ba
SHA14d24f79fd9d84da032c7afcf0dd5a212bcac9939
SHA256859bb369411de16593a912a74ef64eaba9600ee3c8b1537de0327862157dbfd5
SHA512bd14e39fa342d47e497dcd56248cbf2e07f3b04b497dfe17dbea94d6cdfb0814186d8573360f8840ab113d5f8b031d006f2f1f7cadb72bfeadbc55ddbdecca57