Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
ff39fcfb9ecdc414c2172545155d7f03_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff39fcfb9ecdc414c2172545155d7f03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff39fcfb9ecdc414c2172545155d7f03_JaffaCakes118.html
-
Size
97KB
-
MD5
ff39fcfb9ecdc414c2172545155d7f03
-
SHA1
806b9dccfa417a0fb3cca234cb7f1f147ed6fb60
-
SHA256
2302cd5589fda6203eeb73f1eb180a4e15ac22df7c854f679d0363f454ea50da
-
SHA512
e2ebd91a92b71a51ecf303bcacc7914df3e26a9dbdc4466a7412ed9aed7f2b5bc2d2c202b729d56a786c22afc0462e8e582752bed63ad9cd30272609248a96c6
-
SSDEEP
1536:Vh6oWxCs98dFZ9CjVmYB366j+iuxqvJX9LFs98dFZ9YxwzZEH5:Vh6oqgdFCjsYB366j+irL1dFYxwzq5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 4436 msedge.exe 4436 msedge.exe 4396 identity_helper.exe 4396 identity_helper.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 1556 4436 msedge.exe 84 PID 4436 wrote to memory of 1556 4436 msedge.exe 84 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 4868 4436 msedge.exe 85 PID 4436 wrote to memory of 2940 4436 msedge.exe 86 PID 4436 wrote to memory of 2940 4436 msedge.exe 86 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87 PID 4436 wrote to memory of 1588 4436 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff39fcfb9ecdc414c2172545155d7f03_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaae9546f8,0x7ffaae954708,0x7ffaae9547182⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8217659840677029011,4190050447702441547,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
1KB
MD57d9bda2b64569b9249813c303144be05
SHA1d876a52c357eb2f0da25d13b29d1c9d8d2c3e254
SHA256ab73af780737a0a1808e34cb50891e105038949b920edc79abebdb627f74fe5a
SHA51204878643f3bb0b92936fa3e97989136d5a97f25aec2ac2daed295d855ab67493606e365909c91182d7bca1a2444203b66ec58d5550f7f051fc75e432c6e1262b
-
Filesize
6KB
MD5f728f962f2e238c9be270da852373934
SHA179e4f8efa7fcd260d0406f4670aaf9930de62959
SHA2564313d05b2f031439b65df07873559a67bb8e01fd14d5bd29ed278dcacf1e7f1a
SHA512322d776aa40ae8a42f7858a7fc6af5d07f34684bbb99e67dbc532dc62791b1c44fe5afef36f32bacc58813a7adb7ad1e586082545b82b7394a3e2f1338f27ea9
-
Filesize
6KB
MD5eac58b36ed71ab2656a9933ef00956b6
SHA13a143e4902587edc381568d72f57d62d6be317f6
SHA256ed9dba8fc2c28008e01bb4bce2861fbc2f77974dba005d3a32dccad9098f0ebb
SHA51218fd52fe20017fbf6c9935acfd181ce99f470345c7261babf34b937b5ce7140e1b1ba8d466b151a2ec821dc72b08123725e406ca5815ae0db432d27ad2396c71
-
Filesize
6KB
MD515dbfe94b6a9351d92f547afe220b948
SHA1178638611389583ca636f0621b1632108e9958ad
SHA2560ba427a30b68087279a85f5c829674acab6c654d7dff0bd0dd407959e2d01867
SHA512519ffe6b6b66c809c0d949598f47059176a183f1574f23bb901244e3cb9d2d9f23a0f3bbb5a35529c814a2b3393ffaa7f39631ceb47682c6072542a4be6b5fdb
-
Filesize
539B
MD5c54ad5096f0186a554a7a45fbf232705
SHA1ea063d6f8f49f9fb8f955fc8704b208d4fb18b3a
SHA256681554e1dd0a07a79fd4fafe30a89f6755c9a742557ef0648c0c44b86c484c35
SHA512bc4bf46a995cbd48f45b9bc7a9dee6f1be77ef12e957bc4836a4306e352f6c3a5121596bb5ebfe7de3dcc398c853aa98a7d4e89dde57c412962d7597753a6e09
-
Filesize
539B
MD5c58914f2ad81b38f1be155478de7b643
SHA12ebe028b766ab8bbc8a840655d7f7d399f8ebe04
SHA256786d0e793ec1ff15957ae50c73a073374096819f49074d781f379841121043c7
SHA51234b0f741e7abbc9d866a17980d9bb6fe58d78e67d3375ee5d3495cae76aa93b8fb507e60c1d2aef750e249447a39cf57054213c4792611dc6392571dd278db84
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d605a1a62dc4e96d1b60fb81185fb7db
SHA1d079a0ce55d2342c3c2086d50300ae4783a0cab2
SHA256dc0418594e027598349719a88031532f08c0aae523ccebd08cdd5de15ff640b8
SHA512f99cf9fbed2404b7a1512457e3f13e314730b5b2dd607cd7e1583dde8061bdf96dd958aa8a8a9e17918c570bbe38d6324153b8a9aaf232bc1fba1de15f7ac192