Analysis
-
max time kernel
120s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
024f1cecab22476c700b88c545caaf1b_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
024f1cecab22476c700b88c545caaf1b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
024f1cecab22476c700b88c545caaf1b_JaffaCakes118.html
-
Size
3KB
-
MD5
024f1cecab22476c700b88c545caaf1b
-
SHA1
bb36f49729ae63596f30cbb4ced2bfbdbbfe9075
-
SHA256
9914a7299f9d807add340477c499c41f8cf0cb83f8b73360961c634db8d7d5d5
-
SHA512
a2ab337fd87e38a5b68bf39ef716df9f8cb9d86b1230b3693d85ab7dae01cd108f0f631cf772b4b483d926a29283a2836da343cd8bc8e25818f11aa2d6c0f08e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 3388 1348 msedge.exe 83 PID 1348 wrote to memory of 3388 1348 msedge.exe 83 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 928 1348 msedge.exe 84 PID 1348 wrote to memory of 4524 1348 msedge.exe 85 PID 1348 wrote to memory of 4524 1348 msedge.exe 85 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86 PID 1348 wrote to memory of 1456 1348 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\024f1cecab22476c700b88c545caaf1b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fddb46f8,0x7ff8fddb4708,0x7ff8fddb47182⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9358154382301669447,1682266837789141267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9358154382301669447,1682266837789141267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9358154382301669447,1682266837789141267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9358154382301669447,1682266837789141267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9358154382301669447,1682266837789141267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9358154382301669447,1682266837789141267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 /prefetch:22⤵PID:5072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD596d5e5b12d75a90c3b52faf2e5c55173
SHA186101a470af24092e9f291494464a5a207d7ab30
SHA256afdf63cdfce0534ee69ec2f824d94064b36d0d7d730b9273a2b751e1bffbceef
SHA512ec0820a240dd0cbd58519912894e16a4a8d2ced323bd21601766844653c7cf09ff97ffb90e93fbcdae07ff13181b85a8daa18c5c7a483a9829e0bc6ec5840aef
-
Filesize
8KB
MD5ede8f1524bd786211555569015711e53
SHA11a63910949c9db4f42f231559bd389fd2238cc45
SHA25655ca081df332d49588df44acf7b418b5c88a8280e719a7658871ba599267b530
SHA512ed72326c9cba56247e3a87f752314e2e6c64f301824fd0e0562087dceef51b920832c1ff85793628053fc6edd26bffca57bf5ddfa1a11f57afade0d1255211fe