Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
0e6a71b7f58db08d85e6a1ea72a88581_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0e6a71b7f58db08d85e6a1ea72a88581_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e6a71b7f58db08d85e6a1ea72a88581_JaffaCakes118.html
-
Size
132KB
-
MD5
0e6a71b7f58db08d85e6a1ea72a88581
-
SHA1
1fe2cdb5af04d35471af9b1cbd50afc85f9a93b6
-
SHA256
ca1fda1730c1e5abd7f14ce4e1ce68bc50afe7720fb243498dea15e225607aab
-
SHA512
38978f2bf72a97a5d6f8f0ad2527b1746a3f40f38d442eb2d7dd3fcd2847eacbe6b812f3bd30da14d71a873d6fd48da6c5cafdcfecb5e0ba2df6573c8194c90f
-
SSDEEP
1536:kyWStSsSASJSiSBSQSPSiWt1dt7VtWetNytgTtbxtrstDxtMRt98t7ztRktGRtdw:DwKDB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 2920 msedge.exe 2920 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2336 2920 msedge.exe 83 PID 2920 wrote to memory of 2336 2920 msedge.exe 83 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 2664 2920 msedge.exe 84 PID 2920 wrote to memory of 3504 2920 msedge.exe 85 PID 2920 wrote to memory of 3504 2920 msedge.exe 85 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86 PID 2920 wrote to memory of 4432 2920 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0e6a71b7f58db08d85e6a1ea72a88581_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc325346f8,0x7ffc32534708,0x7ffc325347182⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12004401979022523706,5104476133786321145,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,12004401979022523706,5104476133786321145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,12004401979022523706,5104476133786321145,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12004401979022523706,5104476133786321145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12004401979022523706,5104476133786321145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12004401979022523706,5104476133786321145,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
388B
MD535afc7b903bc394e4e100d6d38a523c1
SHA16704d3aa3fce9e8042fd0be3d8ea493905dab8ce
SHA256dffb1b10d8541c602112b0cdecfbeddad2c720c1b277019527b12ab4eddcedbb
SHA512872107c8d9aa0fc88288b585dc4638ca5269eb59432db479101cf3171eaba80a3240e23ff9be1ce3586eeaba820132d4fb765bc184e662743fbc1c23bd844127
-
Filesize
5KB
MD54827469c194fe1f738e92a4d58aaddd9
SHA124466bdcbb191a8e372e77efe23062e18b369a2e
SHA25604e5ccb68e5b49d2aee3a7fa9bf0e8f9c2cd7040b28b958602d90446b20961a9
SHA51236456220666f1e7fba6ff35e7ece3928a9d31d43e5a20e089214ac0423cc77dbf0340e3313c6f0e2e21a72857824867bbc7e21601d326836cc911ef1c573dc32
-
Filesize
6KB
MD59db7891bfb998a536539664f93c8a5b3
SHA1e188be7cc2b353ab76a6978ba77989953baa5081
SHA256189bd9b85c8fcdd96441cfc8f2dca2399537f6b70c65ce10c38411d845653efd
SHA5123c9af5439fc29ac6cbdcd4e02e92dce6bdb95decc09316b87d9d24e637b17af31d906bfaddc1a7d5858dd945fc04cf6f6b141b7b2c2608e2bd65498484d58319
-
Filesize
11KB
MD52fb367b2b5e00855f88de439e48f9b8d
SHA1eb025fc44c1fadba101d11f91714b25bd9c50292
SHA2568866609c1434ed13a2eb7529b1aa65437aad61c33ce1905898d6ede97b5d9d26
SHA512bd3c5b50191e725eacd189287b4e3a907b340600e8694cdd9678ecead1a239ae2a032c9f329eea25bc9456ed7d39ea5be68d13b155f6f0ef8e5782c0751d0283