Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
ff2e55cb72923cb06cca8a61901db5c5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff2e55cb72923cb06cca8a61901db5c5_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ff2e55cb72923cb06cca8a61901db5c5_JaffaCakes118.html
-
Size
7KB
-
MD5
ff2e55cb72923cb06cca8a61901db5c5
-
SHA1
6021935a1dca9a7c4a14ca249188ce6098a97665
-
SHA256
c2792df6ea11833994e534c67e695d9f9087248b12c2385490f7732856c9a0d8
-
SHA512
06180e07ffb6fa40506382c35953e1f2cf8e0de9dceaac4bc793e262d8b6713eca02803ee68d4bc5a9c25e6cb2c4a57449e44ed09c90a13f7a08daca8a81df45
-
SSDEEP
48:ImMq1Up7ANAiEgVr+CflxYOZAyWWjY4xt5YWDrWN8KFuFQGMWdM/KWFpGAiIeEAi:SIFNf9ZYwoF4mBkYdRo7RC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 4580 msedge.exe 4580 msedge.exe 1352 identity_helper.exe 1352 identity_helper.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2608 4580 msedge.exe 85 PID 4580 wrote to memory of 2608 4580 msedge.exe 85 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 3652 4580 msedge.exe 86 PID 4580 wrote to memory of 1596 4580 msedge.exe 87 PID 4580 wrote to memory of 1596 4580 msedge.exe 87 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88 PID 4580 wrote to memory of 2460 4580 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff2e55cb72923cb06cca8a61901db5c5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8097d46f8,0x7ff8097d4708,0x7ff8097d47182⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1912 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,4119480544500582761,4139582167174907012,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
5KB
MD50923173c9cc344640375185730f77196
SHA192ac05506be64bf5e68c86261b6927461e49e2b3
SHA2569a8c6e0914e6ab65a6a1ff7868b41fbb227881d565326f5147b7cd09a6b2faa8
SHA512e78a9dcd593e59ccbcacd97a7e7a034e02fa6cbb45477f83f7981ad3dbfd76b6fb1e0594e9bcefcfa4a37ce51e56d6f2195c463047bcbd9a77f21c1b5de7939e
-
Filesize
6KB
MD59d1a2859af185d610633b9ef33efd6a8
SHA142b5696ae0aba9db7edff40057256edbbedd71be
SHA256eb36a284ef709d3548dee23e4660a1d0e1e7617df5b0d34d77ac7e4f922389a1
SHA512e41387079171364ccfb429975edc4bb2097d102d6bcd927fbd8f89512a612f2bfd7b8018bf3b612da113be9ebf07a2c0e23c36229d20723e2cd4b946646996d3
-
Filesize
6KB
MD5531e706088fe46078e958cabb7f36801
SHA18979dfcdf45f94c4c1d4f5c8d83635b4b70660e3
SHA256130807ca65694a2f4c7aa444eadfd7bba629c80c17930f9f071b593616819f94
SHA51267596e8995ebc5f61bff48a3eacfae2eb8e331999c8cb9b87aa43c1d73265977619d273870a93e97aad1c94c3327afef8817f1ba8759fc07fb5887cbde91b247
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5a12d2752eda9f76ed885a1798635083a
SHA1c12cf5c3934e0265f3158376c6da1e22acea833b
SHA256cab4443718a37ce1923d758678ecd9c49bad7c2c94b56cd39e1864d8e9aa4bb6
SHA51250193b270c3a9257d8bf4960e78c4212323f2c63071820ff7a835b6e9a215690e8490e90d670845ba908949acb69d626399aafa7fb316602ae12ef622bd0635e