Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
ff40787a0879450ee2e49cf4d5a27578_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ff40787a0879450ee2e49cf4d5a27578_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff40787a0879450ee2e49cf4d5a27578_JaffaCakes118.html
-
Size
152KB
-
MD5
ff40787a0879450ee2e49cf4d5a27578
-
SHA1
c326bbf28d54e2b2cc0544b983713dfbc9697156
-
SHA256
ca6dfd1297da3ff4054bd710f190d93e651451bf1458136126fa4d8ce8b981ae
-
SHA512
a1fe1f9062cdf22643fbda755ab6f6faa089efa4a984ee2f241524fcf6a02d083625826abd0e5f53dfc994575adf189f34afffbfebc7e74af97acc2a5cfd415b
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcSiEHADPWLpjXedccZyFdNDp:sxaOLk6T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 3144 msedge.exe 3144 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4924 3144 msedge.exe 82 PID 3144 wrote to memory of 4924 3144 msedge.exe 82 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 3588 3144 msedge.exe 83 PID 3144 wrote to memory of 4752 3144 msedge.exe 84 PID 3144 wrote to memory of 4752 3144 msedge.exe 84 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85 PID 3144 wrote to memory of 1440 3144 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff40787a0879450ee2e49cf4d5a27578_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcde2346f8,0x7ffcde234708,0x7ffcde2347182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10166199083059652551,12808101394170081161,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10166199083059652551,12808101394170081161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10166199083059652551,12808101394170081161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10166199083059652551,12808101394170081161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10166199083059652551,12808101394170081161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10166199083059652551,12808101394170081161,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1458e24d-db7e-4869-8a68-a084a2324bc1.tmp
Filesize6KB
MD5899c82137800905be2af0b28d8e84034
SHA1031ab06de9bc140b3c387a8399c83ba772554bea
SHA256166dbb60e2caca11f2db52cb56b697a027dd6726dc97712f5a2aa714f7e22ee7
SHA5123cfa1023a250e938ac6bf70b55dde3f05c1d963e4e73fc800978d0f7ad56e94b16ca172476d10f9f2c73edb171a34459e56916e0d5da1cd1940cdf129441233d
-
Filesize
5KB
MD5b2910ac5b5d2bcd61003cdd4b53dc84b
SHA187857d35f6569df0f4b80dac3f6da7c9ee0e6769
SHA256980a8dc19d90d3a9bac812f82cabca05237539aa61eefd07c13903355a6bf8ad
SHA51288b6e8cb90fdc8805508be72912582e4a44e4be6f98e7638e14479bbd6bae6e994700b8dc638d220afd993c5099671a254063a470f32199db563a8f49f414e93
-
Filesize
10KB
MD5bd5ae3b93da6597d877e9c21bd52358a
SHA13721d70e1000bc628afb0a6c6b6938996cd23519
SHA256453765a96be9d1e9e084fe1661e0c267544bcaacd636a69460822c04b624c0fe
SHA512135034fded85739b1ab8097896bf88a47e653c2e461615ad810c3616209788b2b56adae6313170432c13dab7337641294f551b7884ba2cc8193bdfbb1d9f3748