Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
0af58ce39a4cd9c05829ff78436601b7_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0af58ce39a4cd9c05829ff78436601b7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0af58ce39a4cd9c05829ff78436601b7_JaffaCakes118.html
-
Size
275KB
-
MD5
0af58ce39a4cd9c05829ff78436601b7
-
SHA1
84a80a162268a9909f437f88a19c59fba53a9b48
-
SHA256
670a9abadb333e348a15759d91987d904c617657429a3b2f26a2930d9641ef43
-
SHA512
bab4622bb3bc6a3b5cb4f8760068c59a6dda88a5956af4d07e3ffcd857cf5d1434ad9990bc7a5f978e2bbd621a89264f1fb2924f1d88c087e84ceb743cfb4950
-
SSDEEP
6144:QSezZF+x1WlVZBavZ/4dvift+qFxTEtV65qco8BtfhFD7JtavtqWcIVov/36z/Lf:QnzZF+x1WlVZBavZ/4dvifttFxTEt85g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 3180 msedge.exe 3180 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3540 3180 msedge.exe 84 PID 3180 wrote to memory of 3540 3180 msedge.exe 84 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2816 3180 msedge.exe 85 PID 3180 wrote to memory of 2936 3180 msedge.exe 86 PID 3180 wrote to memory of 2936 3180 msedge.exe 86 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87 PID 3180 wrote to memory of 2068 3180 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0af58ce39a4cd9c05829ff78436601b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8ab46f8,0x7ff8f8ab4708,0x7ff8f8ab47182⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5448699771613346074,7900186661414810648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5448699771613346074,7900186661414810648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5448699771613346074,7900186661414810648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5448699771613346074,7900186661414810648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5448699771613346074,7900186661414810648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5448699771613346074,7900186661414810648,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
990B
MD5978f6a059f670528eec5862e6db9c560
SHA1c9da123adcfc2e20b97a6dee046c4176051bfe05
SHA25634e5b8a4257695c4aea70797ff0c6a32ab1271c8bb143b41988f8bef381d04c9
SHA5125fdd40bc3deb0345d7301338fdbff6fd01b87f1f5625006dcf1eb35baf4b36b30efa9ac7a421c806597d9798d444b4c0df42c9b2ded5bfd1403e6fa4d0ee5ab3
-
Filesize
6KB
MD53dfffe84883e1bba3928f3b4850a96bc
SHA1cac51566c3fa0dd49ed43e44ba874690fa9818c9
SHA2565fcf0006a80a94c7b7f12e1fe236c158a8c4acf6dcd706465b7c9c586f4c5c0e
SHA512978af0826521e994345f5fd77e87c9e78a902e78f884945cdb3fd564fda32679aef2cc62df2014c04d2af7e24b7b8808de482dc4c328ee6deef8d973b758a2a3
-
Filesize
6KB
MD584b7be08bc20f51190a454ca5a97c7ba
SHA15dc88239ee30fb410b9908493513867159f2e8db
SHA256a9e34492d34dbb6a0e7e825c1e4dcfd5a6c531430babbb03573203ef0e61b9fb
SHA512a0f32327cbcfb410f966d3e0b06d5182b5c1d5a1c7b9e7055c283c40219549ecb7c68c131b0b471c758597520b36ff05e054d396e5dd66a633543dd2524e72e5
-
Filesize
11KB
MD5457c2b72016dd1e3579c08c1b184a063
SHA190a64b84f0c6199bc1963e5767c59051fff66bca
SHA2562b8e6dcf55ea0016b89d34ce441bd8ea57517da0cccae4b93325ad81287d9128
SHA512d39a94baa9a844f2b3da158f98e1b0278d3c69417eb7c53f4983c24a98ca163a99160a4c57af0e1ce6eedca775d001f00d2a861a4b2b6bba75a90538c8b03234