Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
fb82cc4c9f47eddf67154c6e303cb8bf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb82cc4c9f47eddf67154c6e303cb8bf_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fb82cc4c9f47eddf67154c6e303cb8bf_JaffaCakes118.html
-
Size
367KB
-
MD5
fb82cc4c9f47eddf67154c6e303cb8bf
-
SHA1
0c2a2812e97d7056de144a5430e273ade466993e
-
SHA256
7a4038ceb92b5228a75fae5780f555fdcdb98d4864922db798e47bbd5fbe4675
-
SHA512
511b8193011db5e26bb586cd67760975758f753ca1e149e007b11ec1ba3450089e64d6d1384cfe5a186097e2d1fe8cf6e088ea722b9156fa4ce22c1945a41dd2
-
SSDEEP
6144:o6CAbcVkpCYIobRECFiNU6bxhgt9K2VDhehaWvUtwQzM1cVFEp8rt0lq2obhbD26:+AbcVAIobRECFiNU6bxhgt9K2VDhehav
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 3448 msedge.exe 3448 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2788 3448 msedge.exe 83 PID 3448 wrote to memory of 2788 3448 msedge.exe 83 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 2688 3448 msedge.exe 84 PID 3448 wrote to memory of 1100 3448 msedge.exe 85 PID 3448 wrote to memory of 1100 3448 msedge.exe 85 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86 PID 3448 wrote to memory of 3424 3448 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fb82cc4c9f47eddf67154c6e303cb8bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe245046f8,0x7ffe24504708,0x7ffe245047182⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,8144519294056913134,3252998404616563198,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,8144519294056913134,3252998404616563198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,8144519294056913134,3252998404616563198,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8144519294056913134,3252998404616563198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8144519294056913134,3252998404616563198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8144519294056913134,3252998404616563198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,8144519294056913134,3252998404616563198,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
2KB
MD58e4a2d1f8adcf92eda955ab54dae1d78
SHA17c89803478d4330805fec54edcabca063a44a4fc
SHA256a0d1325f192f475e71c367fdd54f5aafe9e6b3bf23af96bb8e34563704e29f26
SHA5127262bdfa9a0e937cf0d017e420f60401c51af43300e39e26d3952c6d127274437d3fa3b6aea8d0e141dedb1ee1b4fbbb726364e2c6714954169ee667fef788dd
-
Filesize
7KB
MD5630d120704de342e8bf6c9fbd92604c5
SHA160081823b9d068b089cdfe401420cb23cde98bea
SHA25678c033e44c9d4530da7bdbc3c692cf0ff2dcad1f40ed211d89c192c6d219ac05
SHA5121028d1f23282b930455bada8c7afe145b8ba18a53141b4d3f7ed7ea243771017025872eed7f08321284193e4c11219c3250a9dc883272e6a782a227a11375835
-
Filesize
5KB
MD547b3f564846e1c1854e31da2c4bf8c64
SHA1300367bde6db44cc8e922a3dbf2786b722a6f1b3
SHA2567b43382cb5195dd0368de0eeeaf0a85a5ee5af4be3a628ab24990aeff2fd35fb
SHA512ab65ee7f42bc6881aa1e8369ae2d1841cf0ce9293dd5bb26f444a32de588ac91487127f8adb32d962b43f7857c525f728692ab8420ef93deb103a19ba6bd70ec
-
Filesize
871B
MD5e88c79e41eaabf6f1ffb431d5e2bd05b
SHA1ec608f93fdc3b42e67967fed8384d107cdab5571
SHA256f7d7776d613dee45f181080821f7910da4d94345b72a176a10caff84708dabbc
SHA512561bb1a651c423d9e93c2029dba238848ba043fbc21724e1655f202a6b1770ce58dbc87a96fe9adae8d31b03cb4d2dbe4b64e21852e2135851ecc02ebf8b8d5f
-
Filesize
704B
MD5652732f0543ff2290b5db9c1eeb83ae8
SHA1bf7395f90c47c044db2ca1184405f5f85cb030b5
SHA2568b7a6a89ffe4c26834c70bdfc67f59b002856b316e63939af14e8339dcd10086
SHA5124a1141462e55d55f2bf8a821d794cb8030e7fe8a71758475952e62c20036e23fb61bc44107370e5c21e4299a870f4846bf09b9d6ae55d54a3aff951604d9e509
-
Filesize
537B
MD56a79aff1580fd01b5e88937fe64fe7c9
SHA12286178e4b92bd02a2aa162c41cd44be62dbd1d5
SHA25630f24bc2dd6bb24c24c9695cd5f98f27a713c8082e96720bd6d125b04038beac
SHA5127aa1094a29478e1a0e4dedbb0d4388d0ec6a7b45d97bb5c371745f6a928667be8fd080603a0269492803b6208c4c27254c5602c5e81558bfe78558467a417c83
-
Filesize
10KB
MD594ae19a8d7478b30d4b3bf43bba7b359
SHA14f91175cfda8036c2047ceb95dc679f29929f3d0
SHA2562de3f1e00688e322f76fa146a0abf8fa000e14c631081b7d0756aec20182595b
SHA5122c8b1f3743fd61a70958d810f15f9b161f8b4b0f3af068e0c0b2c987f8c677e52d991e6f2277ce61c609ce2f404e608ee35a154907648744108e15978bc0843d