Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
fba233ec539415611df7e510a7817e30_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fba233ec539415611df7e510a7817e30_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fba233ec539415611df7e510a7817e30_JaffaCakes118.html
-
Size
354KB
-
MD5
fba233ec539415611df7e510a7817e30
-
SHA1
0c923ccf25e9c95b20e6b82d0c5fd0873211e50a
-
SHA256
906023b80330b4b4a9753e8e057057d78ddd581bdf68e0fb32370168758d1125
-
SHA512
a7a2641397b54acd009fb5cf20c39dc3d9be8a0dc30fda99b5bd57f0eba1a4d3262dbe34995a56a5f4453cba845e06b8f9c344d38c34e3ef0f9b875dc8414324
-
SSDEEP
6144:SGI0WLsMYod+X3oI+YqsMYod+X3oI+YXsMYod+X3oI+YQ:A5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3208 msedge.exe 3208 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1972 3208 msedge.exe 83 PID 3208 wrote to memory of 1972 3208 msedge.exe 83 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 4104 3208 msedge.exe 84 PID 3208 wrote to memory of 3644 3208 msedge.exe 85 PID 3208 wrote to memory of 3644 3208 msedge.exe 85 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86 PID 3208 wrote to memory of 1868 3208 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fba233ec539415611df7e510a7817e30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff35cf46f8,0x7fff35cf4708,0x7fff35cf47182⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9050101910630380111,6260600048283334654,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9050101910630380111,6260600048283334654,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9050101910630380111,6260600048283334654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9050101910630380111,6260600048283334654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9050101910630380111,6260600048283334654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9050101910630380111,6260600048283334654,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
6KB
MD51f76e9efcec25ec6a3f80e8810751db6
SHA18aa1345175fef42b37000af4572fa2928223597d
SHA256fb69abbe50ebd08bc84cb485ca0186e374bcac7c83906786c288874510324106
SHA512e2b89f70f69ccdf6e042ee7b822bb8e3865c5d0cf179eecc8c5d1ed0b0a94566c4b56c000ab865c35724e4eae5b7c5410e057187b0e3ee993688798fdc64df31
-
Filesize
5KB
MD57c51a3a6339a683e6345163b0b267b29
SHA1fdf7f7d773b5ddf9e02b696ff9f3bfdcf5c1d1bb
SHA256dde0b84b6d3ce8b8a209d9d5322887e258d54b6533fec656746f48624cd5327e
SHA512087b051738de44141fda9e0767a6d78a412e99cc941d2ad91369b9c011b81121288466681ded9d9093916710b75d4d79dff842d693a8eace52d30fae15337897
-
Filesize
6KB
MD54496944c27d40cecf476479ff8ed0f2d
SHA10a4d81d2bc8d010cfb57c76915b29c343255080a
SHA256f58828a60a02a8c8a3bf509ebb5c66603ac36cc057bf563c273d81b76ea41a14
SHA5123d6ea19c913a0dd4e998f2c2a53e035a8b82616e7935e6891374e6c54ac6647de76c3e4239f4cb99f3b4d16fee68d7c54a97f7faf21318d5d2eaf91ec5eda5a1
-
Filesize
10KB
MD534d98889028fefb8e9c54478efb1bc3a
SHA140da7db13b6a5bd0787135dd8f2354b7dc637e6e
SHA2566261fef025429c8f0577065a17b3ff6615bdb6d7a79a3c493cc5347b1d964bfe
SHA5120d329a6d679f2abf8984309e161b6751be0072f1e90ab0a1a37ff174557858a10fd8f319d3a6e0025b0d345b2be0ffd8ad819ba2b8ec5ea5f46fbefc95db9f79