Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
ff2ae426ceecfc6ed0abebfe4eef9eee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff2ae426ceecfc6ed0abebfe4eef9eee_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ff2ae426ceecfc6ed0abebfe4eef9eee_JaffaCakes118.html
-
Size
16KB
-
MD5
ff2ae426ceecfc6ed0abebfe4eef9eee
-
SHA1
647b19e94b928142407b65040d3716407c0e3001
-
SHA256
aba4a11975d1c6182f1b48db20c82dd8ea8726ae0c0927336429c81984591478
-
SHA512
f718c954a23aa188266ec076b532a37411b4e30a7e01270056506b9b3fb7647880acfd491557e2c255f39a3d4cde519d354a6ce6a47a7eaee9416a3d31bbb020
-
SSDEEP
192:jRcC6ntGm6/v0mEOIDg4Tw3sSZtpd9xY1MW:j27e0TPV1MW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 1524 msedge.exe 1524 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 2196 1524 msedge.exe 87 PID 1524 wrote to memory of 2196 1524 msedge.exe 87 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 2012 1524 msedge.exe 88 PID 1524 wrote to memory of 4316 1524 msedge.exe 89 PID 1524 wrote to memory of 4316 1524 msedge.exe 89 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90 PID 1524 wrote to memory of 1084 1524 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff2ae426ceecfc6ed0abebfe4eef9eee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe121246f8,0x7ffe12124708,0x7ffe121247182⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15838251111807326087,1341703026248849654,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
5KB
MD52ba964e8006b0285e1b63498ca1cb6f2
SHA16a9f0af5da9aa7d5929a2070fd35fdcfd5dd810b
SHA256daf11d353aa70e63d79cb7bb7a30c09857e5cebae9b8bd0604fb0c14171e79bf
SHA512f7244f9a199773df6067e4e17075bdae7f2de9b96d9af80b347b2128627443560292ae07e6fd2a70dba6a6062d67c60b4593481dd3d1003af5ff47f65e988624
-
Filesize
6KB
MD52a0862f5a0e29feb82faf5a181fa4ce7
SHA1c0d195098dcaab897880b1fd6c00dc2f9aa708ec
SHA2565fb66803038bb3cd3c12153accb87ed32eddcdd6e5d64e5fff6423c64d4f2e6f
SHA51288330be188333ea610838122e37bfcb448b9a771aa31fdba23b1eefada4314fdc22606565df84e72c522ae67443f0fa52802ebd9afafcb8c27b7b9db89c9ca6b
-
Filesize
10KB
MD57272fa0aa8bf2b8671b73b9ffcd1ba7a
SHA19a55101462e205fc346d3e2b63d40d79050e9db6
SHA25673e228715886044ae3d4054cbcfa5b0df5c27290deb5ba99792b715c2fd8181d
SHA5122aa1326da84012a0be769659d81ae6dcca11342b107128d266f395838e71dca58649bc8c12438bc751419d1a8816a946de52173455093795bab40e2c96324367