Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
ff2e671243ac6491e7da9e23fde57e88_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff2e671243ac6491e7da9e23fde57e88_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff2e671243ac6491e7da9e23fde57e88_JaffaCakes118.html
-
Size
18KB
-
MD5
ff2e671243ac6491e7da9e23fde57e88
-
SHA1
41ffdfd1891b958951e5561df2d85786e2b86472
-
SHA256
fe19677faecdb6d4bdd99eb02526e7f95c4c0cfeaf48a02b0b2df67264333a66
-
SHA512
8dfddbc25d8f242a931aeb1d7266b9c84b64dd2612bc93b1e950f3f2f50d1122223cc43cd38f5decfc47c4ae29085412f15177eb7583b030073a6663e5042e79
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIT4lzUnjBhnp82qDB8:SIMd0I5nO9HtsvnCxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 2380 msedge.exe 2380 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 784 2380 msedge.exe 82 PID 2380 wrote to memory of 784 2380 msedge.exe 82 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 3320 2380 msedge.exe 83 PID 2380 wrote to memory of 1028 2380 msedge.exe 84 PID 2380 wrote to memory of 1028 2380 msedge.exe 84 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85 PID 2380 wrote to memory of 4368 2380 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff2e671243ac6491e7da9e23fde57e88_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb538f46f8,0x7ffb538f4708,0x7ffb538f47182⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15308023301411561207,3908207381195365957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15308023301411561207,3908207381195365957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,15308023301411561207,3908207381195365957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15308023301411561207,3908207381195365957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15308023301411561207,3908207381195365957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15308023301411561207,3908207381195365957,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5f5b12ef0a21c9fd613d2f94ca8dd8e58
SHA12abf34ecae0dd856d0294a3503b2792a119bf1f1
SHA256915bca4ecd798d8aa3a9833cc8f5015c7060e5be9b13b54de4efdf9fdc83498b
SHA512b50d41c4ab2a82253ccdfeca1611f06d7b71584301b01766d948f020cb66affbe946f53b8dccc727ee566f6533f881e964b54737624cf87f1df7ddc154a5776b
-
Filesize
6KB
MD5f3f2f95dc9663e913204c326e655ed79
SHA185f743f64410fffaaafffc3fe728740a85c83f29
SHA25638c4c186ca673b48c91a4a5d0edcb9b6bf8c18b870d9f4bea4530f5cc589617e
SHA5120d434659cac1ab5ddfc1d6bd1dcd9f15271e44dc616e6dc70f4bfc241215c56487317541e12b74f65af11f08816fece6471ef0b51746775840821f0fc2133c21
-
Filesize
6KB
MD5789eda484338f2ca236b15406458ce23
SHA13e92e6f697586a2f6e0c4cf64335dc7899d48efa
SHA25674de774e646c39f2dbcc71860b6fa4b9051a1687a6a4f043349aad99145f5474
SHA5129d56d072f58a43ed9da9fd919f7d75f406135e4df11abb86eaa032198835af6d6b413b897956e12648993840af1ea0cbea36351718cc6984b39f5e254ae6d819
-
Filesize
10KB
MD55a8a36b7773d0f71f735d20c2f7db0e4
SHA1b3af9b8a80701e18945d4e402514e0872f451816
SHA2567cd07aab929bf5b348e53cc66c59366910b7b44e3e7e7f44e66d87744b2ec24c
SHA5127fc07205dbacc4e8ec7c81a8091622c5de8268c71afc8fef5dd59a328d9a0eb1e1e5e67a1e85b8e40134d458517b19adba3f7260f17897e563ec9de84d45e201