Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
fc3d590ca2815bc36f0f39fcfd946e07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc3d590ca2815bc36f0f39fcfd946e07_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fc3d590ca2815bc36f0f39fcfd946e07_JaffaCakes118.html
-
Size
157KB
-
MD5
fc3d590ca2815bc36f0f39fcfd946e07
-
SHA1
0ce0b3b4b6de893abed9c8b788c5d0a3f6911ae0
-
SHA256
73baa6b0f0ef8992320a0b2f263c2dd55c97b37249338b78721523f403b34416
-
SHA512
a0453c61c7458aa2a5bf076144fdb54f7741b1838224da3630d29561cd05baf167f8bf875303630197f58128e23385752cb6da574a015a4301d251f6ed00901a
-
SSDEEP
3072:iNJcLje1DNryfkMY+BES09JXAnyrZalI+YQ:ibqEZOsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1032 msedge.exe 1032 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 4976 1032 msedge.exe 84 PID 1032 wrote to memory of 4976 1032 msedge.exe 84 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 4552 1032 msedge.exe 85 PID 1032 wrote to memory of 1804 1032 msedge.exe 86 PID 1032 wrote to memory of 1804 1032 msedge.exe 86 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87 PID 1032 wrote to memory of 2540 1032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fc3d590ca2815bc36f0f39fcfd946e07_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec00246f8,0x7ffec0024708,0x7ffec00247182⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5515756621784752418,17833900656843377947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
5KB
MD523deb9028cd7e8b3b9f2433605abaab9
SHA1e10e92f2f48f5eea973ba824c51622be8d50f013
SHA256a43fa023f5cf76af2f6daf0377bdcd9c9723f64e0f1fa6a1fbca3df8b7ff685c
SHA5125907fd81a0ded46867014355eda8e1afe37b910e0a9c8c725b9e91fca07772b620f60eeae691ed497e2d21444f6cf066c40919b7aa3943548665b6b4abf8b2ea
-
Filesize
6KB
MD541d7141a9d220c659fe74e12f651eb7a
SHA1793c751d96e634fc47087559d6c7512519571aaf
SHA256d883ea72f3780d7ea6beb28c12de94af098b68f4a50859d9c59a1c28b49e5927
SHA512f6893eed6eedbce863892331e2bde8728ee41bbd2a19dfe622fd36225e2675f568e963029348d4eb816046564098eb5acea93b7c9381f1a69e97ac2c521547a2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c01e6f6decca6d6dbc3df4ced883b0d3
SHA1d38f79bd9a9453ed6c79d999ca98efcf0783707c
SHA256e7098edaa12a9a49105f73b40de32eea90601a5f3c398259c5622dc259a23b8b
SHA512823e3076da7f66f5b73cac2b1007e5563c8329bcb7ea828a68bb5865ee75bbc1022894990c58335511c08715cf00603113e2a40c46aa03b6eb3117445b51c481