Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
fc7cc2af2d147765c4d96d10147cf979_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fc7cc2af2d147765c4d96d10147cf979_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fc7cc2af2d147765c4d96d10147cf979_JaffaCakes118.html
-
Size
40KB
-
MD5
fc7cc2af2d147765c4d96d10147cf979
-
SHA1
535c51c70b8c38f92a0122f419e2117569a41403
-
SHA256
66bb3e6aa47f333025f100565d524a3692d6d33b55d1bed2d0ca5a7896ecc857
-
SHA512
bd0c6c0dd39b967b0af649d3a1d2b85c346268df55fad121f97cc04ea196b191d0a69b8baa9d7c5cb259db866e54d654ab83d4fd91dee8a6bf0f00518311ef47
-
SSDEEP
384:SpRHR146To/uUicQwSWooW3W0AWhQZhLYKuhPqVdEPu/RjR/2k0QACiF/fouSONf:Sp5LtTo/2xjjMLLjxt9eEoBXifLtTC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4972 msedge.exe 4972 msedge.exe 2664 identity_helper.exe 2664 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3300 4972 msedge.exe 82 PID 4972 wrote to memory of 3300 4972 msedge.exe 82 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4832 4972 msedge.exe 83 PID 4972 wrote to memory of 4488 4972 msedge.exe 84 PID 4972 wrote to memory of 4488 4972 msedge.exe 84 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85 PID 4972 wrote to memory of 3484 4972 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fc7cc2af2d147765c4d96d10147cf979_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd55e46f8,0x7ffcd55e4708,0x7ffcd55e47182⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9124435051493493500,14473350465236062380,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
476B
MD511456d322e261516459e32c025430320
SHA12c56279a4d699339066d05cd9ee04e9b2439b6d1
SHA25631abcca8bbb2bd99e03d2a290b6b47ad49de633c97f2a71231db68c346b113cf
SHA512076e884941168f1fa487c9493ae3bc691b94786fc3d365d88637c6f7c579e4c96ab95be503a76622fb73963d05aa6f004f420dedd25e0ebe738f5f06f902f647
-
Filesize
5KB
MD5f714c34bf78463fea627f8e18b640f1b
SHA11652ef226f4e856d70bd28456c0c40f0e2ceb73e
SHA256354481660bdf6a6d01ad0c58df58776267a6c23f724b872a78fdd9bf6bba57a9
SHA512d01e1792b55668371986a068a260ec9870eb82b81be1fe47ad303a4c71570d9d4733fc2d0246b88ca6aa07400022aa2d46cdd233c708c41d5d3d55c51571e72a
-
Filesize
6KB
MD5722925da32bd7ef00a002fa1b83c2757
SHA1d1012b5d1fe7308bbe337e3b0046052f2fe32c47
SHA25670c9221ac5db937a7cdf6d8a1034d350b19ca11c21b6ad06910f6acba1272b25
SHA512cd0691af46720f49b4fb78f9a129369dd7a674a178c77216240833067533b0428fac3e8b5d25768d89796a413504c5da439f49813eefe2777aae0b8bbd6f6373
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5e9a5f79d5cfb9d20211fb657f215b1d6
SHA1edb731e64985dd53b2e159ea71f5a0c7000297c9
SHA256446a004b96d92f9d9ae25a9578f5ec2d10c7a652398baa0a922ef10e1637f7e6
SHA51297bd9b0172f8bd978049df6a1cf7bde637f0e51cc6699934020b23964bd840c2d33ab64d0b8974a7762604db78560398d3888bd2e31c0bec427c779b9ad80859