Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
078136b6b2ba82d22dcfafb0cd2d05e3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
078136b6b2ba82d22dcfafb0cd2d05e3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
078136b6b2ba82d22dcfafb0cd2d05e3_JaffaCakes118.html
-
Size
139KB
-
MD5
078136b6b2ba82d22dcfafb0cd2d05e3
-
SHA1
c9f5deee86d8e4bcb580d72efd0ebee87572ba92
-
SHA256
3f0ebc2de90984438e26bda62059c0248dc3bcad9f448713bb866faaf3760cb2
-
SHA512
3c80e86c22fe037b1c1c0df5395cae1e0e155afd7e12040974abaf9e9e477e678b0b67e1c3bb65377b88ed02fabb184d6a5cbf5aeee3f81b270f3496ddcdf89c
-
SSDEEP
1536:SDFT9H7jvA8lkUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SD3bjIlUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 1196 msedge.exe 1196 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1512 1196 msedge.exe 81 PID 1196 wrote to memory of 1512 1196 msedge.exe 81 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 4564 1196 msedge.exe 82 PID 1196 wrote to memory of 3116 1196 msedge.exe 83 PID 1196 wrote to memory of 3116 1196 msedge.exe 83 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84 PID 1196 wrote to memory of 1192 1196 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\078136b6b2ba82d22dcfafb0cd2d05e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8540046f8,0x7ff854004708,0x7ff8540047182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3587274418882060350,15676263907065259381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3587274418882060350,15676263907065259381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3587274418882060350,15676263907065259381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3587274418882060350,15676263907065259381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3587274418882060350,15676263907065259381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3587274418882060350,15676263907065259381,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD5535b482e790e318e1dd803d6dcd1b6b8
SHA17f73b72c244cc398bbbdd690646bec66b2285ff6
SHA2566cc9d1b69a82d53e23d6feb148750fb5c8a50c606ca8acabcb2c7d1adde1064c
SHA512770e789aa6b1c6e1bfc6d6c238dd1dbb684e1732b45bef4de38c8933c0d984eb2328cea92b2fb39d2c8c2fe96bc84705145f7677e0e2bbfd3de9c8f089f11367
-
Filesize
6KB
MD538cc57877c5be58fa61fc1a970e08efe
SHA196a97ddb19181a1bc5c0dc6e5be49b7dec9219a4
SHA2566bd731d5a81b2f2a0f0eceac676dd3dbd415157e4a7ab6f1744670dc092196d8
SHA5121f10c68af68ddd79a23bc1759fb377543bebba0fd73d114e92e7c0f9bd2eece1cefa604667f0a79659ac62e5e3d118ce84b9149d9ea21d4c8777766f9cc7a9e5
-
Filesize
11KB
MD59a9c04471a2c18b10fe3ea7236bc9316
SHA19a2e36e6638a69ec4581b729b14211c27098f0c0
SHA2562e8d1112a29ee09db7774f8a1ed65f205df244fe9d7751d8e1934819f6bcb9f4
SHA51245fcaeefbff09a468d052609f66619c7c3223a70af7adcc1fd1c9aec5bcdef1a3c355c3fc35af681e9f365f94549b7bc7c715ad9903294623439b3b579c82806