Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
01aabd1ef7346fd8dd8f8692cde0e3c2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01aabd1ef7346fd8dd8f8692cde0e3c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
01aabd1ef7346fd8dd8f8692cde0e3c2_JaffaCakes118.html
-
Size
214KB
-
MD5
01aabd1ef7346fd8dd8f8692cde0e3c2
-
SHA1
b0fcafc787b45afe8c658643c64c23c0ab106391
-
SHA256
d243b9d8726d513267f35807c1e17f7b8de06242949222a401d87d82081e039d
-
SHA512
4433e8bee2141f4dba30680fca43240710383e9da1c37fa76a4eeb10da5c9da0ded233c4c8f8932b38c5ba6e18fccf33a88897a56a06544822fd584dd55c0f42
-
SSDEEP
3072:UrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJi:sz9VxLY7iAVLTBQJli
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 1948 msedge.exe 1948 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4748 1948 msedge.exe 80 PID 1948 wrote to memory of 4748 1948 msedge.exe 80 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3288 1948 msedge.exe 82 PID 1948 wrote to memory of 3076 1948 msedge.exe 83 PID 1948 wrote to memory of 3076 1948 msedge.exe 83 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84 PID 1948 wrote to memory of 1916 1948 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\01aabd1ef7346fd8dd8f8692cde0e3c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9aba546f8,0x7ff9aba54708,0x7ff9aba547182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7189934335200207831,10492273769503350026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,7189934335200207831,10492273769503350026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,7189934335200207831,10492273769503350026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7189934335200207831,10492273769503350026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7189934335200207831,10492273769503350026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7189934335200207831,10492273769503350026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
6KB
MD52635d28589622f87a83fed6091608528
SHA1c1d8a2dc1d20d2db5fb6c57bc14d9d3e795cb75c
SHA256e755c03a0f9bb8cd3da8684c019de53532566356fd1464d569efdad9ed8a2d6d
SHA512f761eed1f8e78edf7b1affd5b56f05e4eaf75a1c09f3cba9f5c3da019c7ffdfce5de13ecdc49fc900680325d949b12f38658d7e1044c8df7c3028a2e111b285c
-
Filesize
6KB
MD51a28da6235057210ffc0849f6ccfc44f
SHA149b70777a5dd73696eaebf5eb3e21087a2da1d6e
SHA256b25439e79ca6a747d4cd2d46fe5dbd29fd2d0020637155f5044b8d96c39c66a4
SHA512c96621465db6aea0b79eaa5b505f5518e86f50c69dd666d9ae38ea3efc3dbce94150bad90244c2a29873639ebb78f6df320c1ca8a687f6072c3e79359fc47071
-
Filesize
6KB
MD5e12d5acf0b44016b613008a92ab52172
SHA17126df20f9ec81242373efee51bdb85af17b623d
SHA256742ac045649985b9d9216f512755a107116ba7144808b6c9f459d6e5afd21c14
SHA51273e724a0a848f666f088db7a41498b010d9c37c543f38ff3183d91bb167876cb046288142b3e981e6ec7a451e0b4fa0be0c6f92be46f8308132c49efbe5f7e58
-
Filesize
11KB
MD5bdc527d5f62493a5b70a6a7e7f4b26ab
SHA1607993e1bc77f0204bff627721d6200d5437a6a2
SHA256668d8b0d8f3fe491266589cda5490978d9d45d13e18c5664ca76cc256b51c458
SHA5124e6e791b19c6fe3d05f820592dfee8c2406b0c7bf7a24d8797e6c358a5cc8f3de0167053cba465a0379b1f1a9523866eaa92532607cf86061abf94ac951a6667