Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html
-
Size
23KB
-
MD5
fff11b32f2b58789ce084b525bc6f7f1
-
SHA1
0b557f9d5cefda0667c89e124199b9959e18637d
-
SHA256
93d5e062521b7f74f1b2e1e445ca504b36d51ac3da6b55e38ff18d7b506ff19e
-
SHA512
7e0ed0c0048162a09d24634498e8b8e6971355a7fac45a471192dec3344470e378e9f6a5ceca926d1c1ba9ce915d03bce37b8e4d6b839b6fb6c8c0aeb003c1ce
-
SSDEEP
384:I6STdWpvL8XaOWCbkX1yH7PQ/ZrVGun9Utv06kNvIKHr1rfUbdcoygc:B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 388 msedge.exe 388 msedge.exe 2980 identity_helper.exe 2980 identity_helper.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 2212 388 msedge.exe 82 PID 388 wrote to memory of 2212 388 msedge.exe 82 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 3740 388 msedge.exe 83 PID 388 wrote to memory of 4360 388 msedge.exe 84 PID 388 wrote to memory of 4360 388 msedge.exe 84 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85 PID 388 wrote to memory of 1576 388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffe15eb46f8,0x7ffe15eb4708,0x7ffe15eb47182⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6519877928681817913,141257294498762736,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD58d62bd5a7e8815c4811e4d28aa9797d7
SHA1ae2be33b4383c561f4ad8fd7f0ad39e60c6982b8
SHA256d1ec43bb085405faffad5846fa0a91447e18cf4dfdf6721c9aca396a54ada6b6
SHA51253db30c9d5daeece0d624f16a67583f50ae209de449d216c0c479c7d954a9ce3b6619b9cb9fac594bf8a871785125d6733ca4b8fc3d6227a1ea07f7a5d17c1ba
-
Filesize
5KB
MD5d57ea2fe26c28d0231f00bdbb832623a
SHA1cd08dfd7f5d8118994dcd3d87386c917c6646d68
SHA256f28a746afa8c026b9133cc14c3e1a9110ae27d8d358cc07c35120e2fe09ef360
SHA51242875692c3b3790033f63a2ff20e83ec3b601ad0fc3772530d3f2dff4f40df1eb154dcc46a2e7c85dd598c5ff8eab972fc6fc41cfa77c5831b746dbc8e6930f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c561b7133b106f32f214bef44e7854f8
SHA120c0aa396286dd8ebd2e019397598e2828aeadd8
SHA25655d99cc93d4b289fdb3e0289fd344aee6d866f9c31d9e4f97d77e995e9eb19cb
SHA512513ddbb775c5f4924406d2681cb18aadedbc365090f5d4187bd42ae5b20b4831745fb61d166db3088768e5877273203642548cffd07c0aa153d6c59cce98405f