Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
ffea3841af72b10cccbe8a5b5af84e93_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffea3841af72b10cccbe8a5b5af84e93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffea3841af72b10cccbe8a5b5af84e93_JaffaCakes118.html
-
Size
60KB
-
MD5
ffea3841af72b10cccbe8a5b5af84e93
-
SHA1
7f30911b128e7cf0349b0eeba060ca0e51501bab
-
SHA256
619452504618863aa9953b5cdd5c0c9208f5d119d1cabae870ee13f229a628b8
-
SHA512
7ac8557cb83f7fa43cb5418a65c290dbec8520fcb7f658feed78584b4618b1fe8074fcfeba35aaa5540bac26029fb2e2ee412b6543c0b01aa77746089e2a44b9
-
SSDEEP
1536:7RZxAsIib8Kt+Wy9a3umloID/s2cCdAxsy:7RZxAsIibvt+Wy9a+mloID/slCdAxn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 2636 msedge.exe 2636 msedge.exe 3348 identity_helper.exe 3348 identity_helper.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2260 2636 msedge.exe 82 PID 2636 wrote to memory of 2260 2636 msedge.exe 82 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4008 2636 msedge.exe 83 PID 2636 wrote to memory of 4968 2636 msedge.exe 84 PID 2636 wrote to memory of 4968 2636 msedge.exe 84 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85 PID 2636 wrote to memory of 2212 2636 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ffea3841af72b10cccbe8a5b5af84e93_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe664d46f8,0x7ffe664d4708,0x7ffe664d47182⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1692 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12335098864683154415,16756777056422584906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
424B
MD55a212958c8d233950cefddd43c504595
SHA1627e6c0d261d099d21571bc862751242ae3dc891
SHA2566b4e06a5cf3e5793ffb09ce4a69fb128c4a4233272fab9085aeb1773867a2b11
SHA512f89f1eaafb54cee5a9463f1f818018c8a4debcf8ada14a9732c9ae01ba931f53d219e28318dfdad33945769ca84b3c4f17256c61cfc64318404721010fc83bed
-
Filesize
5KB
MD5bec0cc7da3589b42cb7d02d811366dde
SHA123860fdbbf8b5d30d91af12366347aaf4fa77bb7
SHA2567decba12acb248f5620fddadaeb9075b1f54e0dc9e9ec133b632739a80d833b9
SHA512728e274f26de0a864a36e3b842e967ccf1883cad7dc43a15820efcf9f69ee716d727d995f8e2593a97ba1c464e39b0655197011f51c6114728b45bd3f797970b
-
Filesize
6KB
MD5a96eae243d749038bf941bb354a31b09
SHA1f787ecff01d7b808cdc6b1b4896830fb25e1209c
SHA256d7ac7156a91a7106126547407b44f6a495ecc576e30d0b07ca5899c5ae5febb7
SHA512908ca41e0e3fc5188b1a4ffbf34caac56a54da4cdaff919b11f9313ee9e70860fd3312edfe15ba47234737b591f16dd906e38077ed9d349cc42b67cd31adadc1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d4d456951f34639e6b81316787c61dbe
SHA187f8e5ef91cbcaff0e6a423b3187d15d18590230
SHA256032c06d2173684140d916c7227e1663c8f7ff4d7632fa8565bdae2baf5a8e351
SHA51275005d6a65a75a5af78bdd1261b905eca416d82bdc69e4731a8edd0589c540088294df00d5062fa6de200c99a82e590e328d4d9fd8859d621f430210d4b0c2bd