Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
09ef42e1d762af1fc37553e48c73a5f9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
09ef42e1d762af1fc37553e48c73a5f9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09ef42e1d762af1fc37553e48c73a5f9_JaffaCakes118.html
-
Size
17KB
-
MD5
09ef42e1d762af1fc37553e48c73a5f9
-
SHA1
269655958d0f8b5c8d5b4309f03ba4be510afc28
-
SHA256
e34f7c078ecd1a5b2471f153496d70dfcb9fba5f1941bd8a695e481ceccdad1c
-
SHA512
db4b142ab883d9337566a1e4c6bddd631aa87ad57efc9b248885fc6d2817f088072f43f9d7cff49347053c87d6b0980eef8a1d6a2f9ea524ef22a488f855f2e4
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIB4PzUnjBhJz82qDB8:SIMd0I5nvHlsvJoxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4364 msedge.exe 4364 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2152 4364 msedge.exe 83 PID 4364 wrote to memory of 2152 4364 msedge.exe 83 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 428 4364 msedge.exe 84 PID 4364 wrote to memory of 4968 4364 msedge.exe 85 PID 4364 wrote to memory of 4968 4364 msedge.exe 85 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86 PID 4364 wrote to memory of 4604 4364 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09ef42e1d762af1fc37553e48c73a5f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb138446f8,0x7ffb13844708,0x7ffb138447182⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7446907865671744186,17340762977121914972,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7446907865671744186,17340762977121914972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7446907865671744186,17340762977121914972,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7446907865671744186,17340762977121914972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7446907865671744186,17340762977121914972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7446907865671744186,17340762977121914972,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59dc60aef38e7832217e7fa02d6f0d9f6
SHA14f8539dc7d5739b36fe976a932338f459d066db6
SHA2568a0ee0b6fafabb256571b691c2faf77c7244945faa749c72124d5eb43a197a32
SHA51218371541811910992c2b84a8eae7e997e8627640bdb60b9e82751389e50931db9b3e206d31f4d9d2dc3ca25ea3a82c0be413ecb0ef3ac227a14e54f406eaa7e7
-
Filesize
152B
MD57ac03b15b68af2d5cb5c8063057cc83e
SHA19b2d4db737f57322ff5c4bbddd765b3177f930ab
SHA256b90d7596301470b389842eecb46bd3a8e614260b0d374d5c35a36afb9c71a700
SHA512a5e9f40dd9040803046b0218fab6b058d49e5e2a3ada315e161fe9fc80ebb8d6d4442ccc1c98d19e561fc7c61bcf43d662fe2231cacacb447876a2113c2e3732
-
Filesize
6KB
MD5886dfabda37c2d5a23e2d5e47b9daac5
SHA13143fe0390ef3d91fc2a6976fed4483521cbec5a
SHA256f02a477e626a72f580ab8844c1e619e877f20754f6dd1cc83e243f1f73f928bf
SHA5124031268603a9144fb70b8cf092a42413929caff0dc741d3517d1349608ce34f314214aa4e469034574451be9505fd78ac2920ca30eae57549931ce6cc0108f6d
-
Filesize
6KB
MD5a0c34854aa8aedb031c1e8b3cfae3bec
SHA1390221007c7a95c39fe8f399389222728cb1d512
SHA2568c43e67e8c4969835e2b56b17d834a1f04b747fbd2bbcd40cd12d6044b4f1226
SHA5129e22adb2c98a7d5ddb109fbc896f322e48a6d7aa915ce9a197b738dc635179b4d211bd11c8ab4ae243638c5d9689c93dfeb71de0ccd6191d6f328a1a0ea7aee5
-
Filesize
6KB
MD532b43d257437885a2fdc136eb760db39
SHA1359a5b85745dbb547ca9fc7dbe438f2d13636de1
SHA2560506829eb22e942671d7d9552f80cc9635734a152375e471e7940fcb1ef2ac54
SHA512fb365eb494091ceaa8f87cfce7deffe0cf30f3f76b1b54bc380bd71dd1214c6e2ba70fa0aa05da9dc672178254646e6dccded27c01b9085baf367199607b6a5b
-
Filesize
8KB
MD5640876e1ee87567f4d893b9e6bb3e67d
SHA13e715d74406c7a600df04eeb07a8e31a6f0b06d1
SHA2568852528ee14e5fa5de9374468ea9a611915530cdb7ecdc903bbd3805269f50e2
SHA5121c5f5fe7b64bde90230f1df25cff1c98c0777a7c12e1c96356374e3ee1bac10fa250f59fd5e6239d19a4dfb148177862b9c1aee86e9a0dc0e260383f273a969c