Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
ffeb4483c1a176fcb098c12a2d042db4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffeb4483c1a176fcb098c12a2d042db4_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ffeb4483c1a176fcb098c12a2d042db4_JaffaCakes118.html
-
Size
18KB
-
MD5
ffeb4483c1a176fcb098c12a2d042db4
-
SHA1
cb774e1b3cdaddb81432f0d43e0d7c9196f5439f
-
SHA256
d6303352b27a98f0c677639777b32387c5f672f21e01c1ae7a704d13a00b1212
-
SHA512
d56c4ed57d984be5c7b53bb6a1e6ba98ddfdf237cd137268c4e174cd8f2fff6cbcf752402fab7fb81334a46b14d4299fbfb9efceba0a13e6eb2e7c19c6c1956f
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIX45zUnjBhTV82qDB8:SIMd0I5nvHdsvTuxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 1328 msedge.exe 1328 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2700 1328 msedge.exe 84 PID 1328 wrote to memory of 2700 1328 msedge.exe 84 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2680 1328 msedge.exe 85 PID 1328 wrote to memory of 2724 1328 msedge.exe 86 PID 1328 wrote to memory of 2724 1328 msedge.exe 86 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87 PID 1328 wrote to memory of 2608 1328 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ffeb4483c1a176fcb098c12a2d042db4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c2a946f8,0x7ff8c2a94708,0x7ff8c2a947182⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,863665352265862853,16706399310453808459,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,863665352265862853,16706399310453808459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,863665352265862853,16706399310453808459,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,863665352265862853,16706399310453808459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,863665352265862853,16706399310453808459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,863665352265862853,16706399310453808459,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
5KB
MD519daeba33d1d418eb78a49d3352ad208
SHA15bcffe6151fca2d21ac4e2a6dfa237c9676d23e4
SHA256cb8f173bba696af3729070a0fe8879b9b53addb0168c3453e17fc0175ca1468c
SHA512311bd0cbb5e9bb54d1cad753cc1a28bb08b4d4d63cfd5908a01be5dc727a158a9717469d1f6b2372dee30298837eba100358617fea1aecf4ea92016682221db6
-
Filesize
6KB
MD5514ec3bd965579b4fe4aa038e4917918
SHA158915bbbc33d2efe265e37324b390c493d6eaad7
SHA256b03c8822c3b77a55bb593bc7fd79791822cd55ea3a4a1cac9aa877ff731990a8
SHA512ad742be6c6f850802e29909b45c0b5aecde7c99991247985327f7fd94a2e5f0d1425f9a80952ba574468db0385e7166347c4d8ef7f6b8679e61acfef4e723fd7
-
Filesize
6KB
MD589a2d1496bf6965f9440f83ef3196788
SHA112c9ac9b1a9b6c72151a4d0f7d7ff4293cdd9217
SHA25639e0af5d11014a056f0b00378af8b0739b0c4061f5124cded242ed4706493085
SHA5129e584936b9577f07285b12183a978f99f070fbd71611b40534b97511499afe719c61fe104d18170cece6277182dd9318a4580dc978544d09344c8f2ee816a509
-
Filesize
10KB
MD5cd592339d4104ef0b7fb807a79d2d6ef
SHA113d3555c8de7369f90d4d7f024bce97c9c7d90ac
SHA256dc152e4a0b8438feca68cef7212fb909bfadbc365b32fa4acc4586dd17bc3c2f
SHA512e997d93ba2a0bb4151b38178ac696bd4ffca4bd8f534ce9798b4fdcb1ea55a805a0c113156416c28f247c45866db2352de29dbdc881390c4a61730e9a373109f