Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
f7a68e1be976c8a4be17b38cd4c33a01_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f7a68e1be976c8a4be17b38cd4c33a01_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f7a68e1be976c8a4be17b38cd4c33a01_JaffaCakes118.html
-
Size
30KB
-
MD5
f7a68e1be976c8a4be17b38cd4c33a01
-
SHA1
939b06a34a93fbb35200eb3253695827720d3079
-
SHA256
0db79ec0e23933f950c0ffdab5ed9a5bb07b74d85d38273fed2d8ca704e41e45
-
SHA512
d8a89d4a25a2ace71f8dea23d4292903fb7f9cc6b87ca28a354fd26cdae32df702d9d3850bee45cdef04ab5085b47718b700959152375632b7836ed0f3f7a2ca
-
SSDEEP
768:4lJOorwcKhsHnsrz3BcaC0yiWht46HQVh7kMCu:4prwcKhsHnsrtcaC0yiWhtlHQVh7kMCu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 652 msedge.exe 652 msedge.exe 2720 msedge.exe 2720 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2028 2720 msedge.exe 84 PID 2720 wrote to memory of 2028 2720 msedge.exe 84 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 3460 2720 msedge.exe 85 PID 2720 wrote to memory of 652 2720 msedge.exe 86 PID 2720 wrote to memory of 652 2720 msedge.exe 86 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87 PID 2720 wrote to memory of 2208 2720 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f7a68e1be976c8a4be17b38cd4c33a01_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeda0f46f8,0x7ffeda0f4708,0x7ffeda0f47182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7131284678504727571,9875503806470594599,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,7131284678504727571,9875503806470594599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,7131284678504727571,9875503806470594599,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7131284678504727571,9875503806470594599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7131284678504727571,9875503806470594599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7131284678504727571,9875503806470594599,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5767af881a8a8372c2d911627e6d371ea
SHA17685573f10d6cf943d5c6c8fb37264f37d787d76
SHA256f10d7849898f40d57f753c8188feb09e6c425802b361494898f3500940cc98ef
SHA51277ce6e26e9f5d3a76700ebc9cbf4b668d29c56b2276caba49ac47d154f8aae37eebabd84afd7a5693cedf30027feec36de81a2c3d056ad7c09846bdccb9925fb
-
Filesize
6KB
MD5c4ddb51343fff0105511748fafd7d5da
SHA1180f46755a6785786d23612653fa8e71cc2659a7
SHA2568fa71aa9632f049e8b089f452a6e4aaa927e7a51c20e9e14ae9573d92460842a
SHA512f75c10224bcdfaa8d76e34fc185c619319a4939f590e9a158a2bff001a4a0e30a2e8f08adcda2832e9009711e55e86837b4d7e2bd8e8393f17a7036c76db77f2
-
Filesize
11KB
MD5c9ace21d4947b92e80667e793997a19a
SHA186f1404dea8a92b35a7f155e876a3964ce38a3a2
SHA2560f2c23c6f75e94243364284d42b50759194af7ea893fbedb6b6b066f7d09ffcd
SHA512ab47cee37c7f5d053953b2fd6982dac9ef383ca79ad92df9193970534638b943f80faf2670e24248f35fcbbf9444074bcb860be6722593ce774c73bb0a6a0c12