Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
ff4ce31167c47989160709b7d4576d04_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ff4ce31167c47989160709b7d4576d04_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff4ce31167c47989160709b7d4576d04_JaffaCakes118.html
-
Size
62KB
-
MD5
ff4ce31167c47989160709b7d4576d04
-
SHA1
12834e46dc5f8416233a493b731c1f5a88ed5153
-
SHA256
61b7562823bd0725017872d6f4a369b61af51cd216d6e8016091bfbc675b0689
-
SHA512
6012164438fc953858e1a0f4d647b8074f01628f49dd78a22742d0dd0c14c6debad781bfb448267245327128a9efa01ce848105ef3653e7689afe278011194cf
-
SSDEEP
768:wN8Vh6FJ1J761WdoMkrlm9OT+MwB6xkgNVM5g6rshlayhsRMx8CPSebILKYr2SeF:aH7ZdGL3wBQkyyg6FgAOIWYS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 560 msedge.exe 560 msedge.exe 2544 msedge.exe 2544 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2244 2544 msedge.exe 82 PID 2544 wrote to memory of 2244 2544 msedge.exe 82 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 568 2544 msedge.exe 83 PID 2544 wrote to memory of 560 2544 msedge.exe 84 PID 2544 wrote to memory of 560 2544 msedge.exe 84 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85 PID 2544 wrote to memory of 4976 2544 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff4ce31167c47989160709b7d4576d04_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee21a46f8,0x7ffee21a4708,0x7ffee21a47182⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1856 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17794184980271379139,10200622094609839483,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD538b0e6c60afc975e18b64e4d5a5e0347
SHA15347fb777c320071b52580f68f209f0b014b9eea
SHA256c7b895f038cb990252f248303c591bbdb0d96a8bfba711bc8771397f42ca038b
SHA51290f9fe3ce21b48431caf3ff7d3512dca8f4e593353d9a529578627e5506c083248cad50d2663de57511178d38acf825ef692825b7a4bea58f45309a332cbfee8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5768ce61da92b4db449a754d3bfb9ed81
SHA10da6b14a1779466a8c3f8b628e42352e977792b8
SHA2565578e0118bcba3b03ae447965128ea208e16a0ef52e9d494acdba2174ad137f1
SHA5123b1d4fe60fa69af4f9caf4382f42fcab06cc93f0b4ee80d500010be047386702c9759bf4cc9724c52859586c4b61549f8a33e567457f2ab5cd0df41ec452639d
-
Filesize
3KB
MD555cff05edd3962779f625f91ac88775c
SHA1ab9f5cf0c84fe88e2abd18df90ab3b76ad2156c0
SHA2566846de1c9d6b3446765f07b7467877ee4c14f7510e0d22224da74cabd4f80cb3
SHA512c6e923b28d49f401a7fe7fb66263491bd0294ec0f80c18e64fad9ebffc6952c83d5e0f7d688db0a1c0c800e45d1410671122f7921421894b7ee1e3420506cc27
-
Filesize
5KB
MD5de4892afd046f40013276297900533cb
SHA1acc0148fc3ab6798d587cfeb71b94f7d5eebb822
SHA2566463f219bf46755b4a96c11349ab4ca1354d240038a2684702df15bc2dfd75fc
SHA512cfaae94ade9fa5f3d66bb437619c96adac66c3ebdba988906f81ced9d3354ef9aa02ab13c8510dbb9c04910dc42d4bdb98c1303604f2c0a407691bc314378176
-
Filesize
6KB
MD56e8a5265f67f6f5f47b30f491df7eebf
SHA1494b1e5c24af55edcf76964017c45c4815ef2276
SHA25642f2b4e795046a1e12a128fc206de3045dad51aa55abdd1d54b5f2609a663a4d
SHA51225ec32c191ee3c97e89eb4abaf4523829f03968d6e8947c56e614327e15b7b60eb670140c88383fc558f1dc8973d905c25cc944c6a5ff40284ba847eaef035b2
-
Filesize
367B
MD59d58e619acbd7739a6f3363b39d6ed28
SHA1989c1996def291c7334c2382e5fb74080a96aaff
SHA256f57527c382252d3cbce0a4db7ba94e8cadb9622999b4ea795b514a106f01e624
SHA5123d24eaf8970ccc9e9a10c0992ac45c42ceebcf4c3e14bfcf48f3e6671947e9b412131c616e80262236dc88b1fc84ff12609e2c053359c70c4158f560aed5a4fe
-
Filesize
202B
MD539a66d01523faa4cf8b02100ea23dc27
SHA1958a232a9fda6850b95f646aa1836c77343ec9ba
SHA256365b32f4d6fdf185b9bf564718b99aeb8d3649448f47833d5e28198c44bf58be
SHA512a6af42535add41c078d1ebf20813f09e5746ac84d569de34fc340d7478cc8189c1bffb5a79db455c936f3fe49669b8bb893d4f32228eee1fc0cbcdb03e836617
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ff3cca61-5a0f-4fac-9f10-bb86fde81ecd.tmp
Filesize3KB
MD5fa99227c57d03366759536b27349415f
SHA12e014e6413790057c1e840603348c313aea14bad
SHA2567e13b3e361c019c5bfbba4c3622551f5ad5b0dd7528f750a6c3e27690c91f365
SHA512f0972f32e2ee2b85d560fc78df45b15a87a73071c1d7c78fad5696ad9860c5f19d8ca50262b233d5dd9662eee1fd913c661326a9a4572dd47a20ee9891137b6d
-
Filesize
10KB
MD520b29aa91b810d69396614193957791a
SHA13808ddf1bf69b1df900688c9188afd78b4792eae
SHA256ae3e5007dae4a23b3ff61b028cef24ce1034d98c97934e54d1a79e0832308a25
SHA51277b01148c47f34a08616938865c86402db28a14c0198713d598e8c11564aa5d4b2dcbb7f8f161d6d23e93792fdb9d6b6bbee7173a7d5892da79760277c42ecf0