Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
fcdb556364d7542e7d28ad2c4d93ffc7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcdb556364d7542e7d28ad2c4d93ffc7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fcdb556364d7542e7d28ad2c4d93ffc7_JaffaCakes118.html
-
Size
156KB
-
MD5
fcdb556364d7542e7d28ad2c4d93ffc7
-
SHA1
7c5ecfe3898338b0d78e166f3dfda01a363328f7
-
SHA256
ab7c165d045887025bd15f013d51aa31a5535c2a393e985db4ebae3192d03a06
-
SHA512
3cc8cfa17d9863aeecf94067898dd00ad53a5770a3507eb0c267e5384435b3f3a50049146aaabfb4d4d21c42b526675e808d04e68e81d223b4bc3192e259b82a
-
SSDEEP
1536:ivRTzIhzP6AZ2AyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:iBXAyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 220 msedge.exe 220 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 604 220 msedge.exe 84 PID 220 wrote to memory of 604 220 msedge.exe 84 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 5040 220 msedge.exe 85 PID 220 wrote to memory of 4088 220 msedge.exe 86 PID 220 wrote to memory of 4088 220 msedge.exe 86 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87 PID 220 wrote to memory of 1488 220 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fcdb556364d7542e7d28ad2c4d93ffc7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc8646f8,0x7ffcfc864708,0x7ffcfc8647182⤵PID:604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6711869186555955206,14514805876661052811,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,6711869186555955206,14514805876661052811,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,6711869186555955206,14514805876661052811,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6711869186555955206,14514805876661052811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6711869186555955206,14514805876661052811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6711869186555955206,14514805876661052811,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
5KB
MD5e89ef06afc59583a4ede9804ae2c8cd1
SHA1618bf487cc2f861115317e8a0ce15bad4bc0622c
SHA2561f770d4a06d80ed047dde2f0740fb221868c9f08d3cc3fa919e2558977dee7e7
SHA5120d74c5150e91baf8fe82249433bce9531a202e9b66a11ed55814648594111fc0f490b70cbecc1c080859af17a6cef846387f30eaea283f8c5d4bc9afa4c32992
-
Filesize
6KB
MD50e5b5186be5904f6138998bbb852e702
SHA19d60070d8afa9cd2026dfaf6deb8e611f62a803b
SHA25646fe794506739ad393acabaf678a3c6198b8dd5d1a4bbadefd69bf89c5240086
SHA512ffb0118859f9b2c280ac3bdf732bb50c808575411e24d0b388e595ff4cc4cb731108f613a3f547c6e2cb19591d5dc1026e52b28c8bbb0bac00c2506aed5b40cc
-
Filesize
10KB
MD5d2e52e2cca2235843f4c6c618819a530
SHA13bd281e2d98e8b71bf053efc02d61b58d437d099
SHA256c7d0aa3c4ca2ac9ba98515aa54258d35cd2ea20f5b14b1424471e67f0516ced0
SHA5128a5c6774eebf4b2e88e8c0b95eed83e52f2b0dce3c86f35f1b2b0dcf0bc4f0dc6c1c97a1e9b83850c2f65f48ae5d7fd8514a67a14df5a9c875428fd09866826d