Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
10b6080018c7f33d0386a4fd8c2bcc29_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10b6080018c7f33d0386a4fd8c2bcc29_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10b6080018c7f33d0386a4fd8c2bcc29_JaffaCakes118.html
-
Size
139KB
-
MD5
10b6080018c7f33d0386a4fd8c2bcc29
-
SHA1
47173fe739be157086945118ae297bd19cb4a01d
-
SHA256
624c4590e8c6f3245d9b87f4da363d4197ea6476eba789639091409d26ae98dc
-
SHA512
a97ffc05656948c6fdc022f90f6cbb48523086762562e241f667634a25c04277b38a73c0d0bee36672e4d68bb10565c348ac8064d8c1ecc1dd8b3f0c40388622
-
SSDEEP
1536:ScxNJSjqzxls/vyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:ScxJQyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3204 msedge.exe 3204 msedge.exe 1416 msedge.exe 1416 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 4164 1416 msedge.exe 85 PID 1416 wrote to memory of 4164 1416 msedge.exe 85 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 4352 1416 msedge.exe 86 PID 1416 wrote to memory of 3204 1416 msedge.exe 87 PID 1416 wrote to memory of 3204 1416 msedge.exe 87 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88 PID 1416 wrote to memory of 1312 1416 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\10b6080018c7f33d0386a4fd8c2bcc29_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa44546f8,0x7ffaa4454708,0x7ffaa44547182⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6345972220718961007,11673632416064428798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,6345972220718961007,11673632416064428798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,6345972220718961007,11673632416064428798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6345972220718961007,11673632416064428798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6345972220718961007,11673632416064428798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6345972220718961007,11673632416064428798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD51fb9fdffa8abf63d409e21da900edbcb
SHA17c8d61575fff30565d8095be5e9db216bef9a354
SHA25617301ca5fc79a36b8612f4a2a5c5d2c084d020b0ed54d8b3a982c25189efe680
SHA512a865a693ac5ceaf74fc67498077b93a192197099759999a32c100b57af035cd7d1ee925e619bc8d0b62ce862dc09ff73899d81ad007afef92f98f299b35f7878
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a6edb935-0613-47d6-a0f1-d9c107d2724c.tmp
Filesize6KB
MD5e0325ec35b7400e0c97110c64ccab43e
SHA12c5cf48694ff3117b2ee7943f1daa5952663fb05
SHA2564e03a70269f3ebf87277977bb23083b1003e69405393d3c4bd0bc0e7db9afa50
SHA5122efcb64922c04dbca237d7c1ef16be41ffabcd965c708b44504db7442307be10d771f2f2c002a97b74efd3f6c5c9288565b844c2a9d0a169e3939a0e66e2528a
-
Filesize
11KB
MD51854f7fee6fb2816156afb4302b0ae20
SHA13e656b9c3657e154c61229392ee9cabc1763e363
SHA256a86ca2365eef4d6110e7d6e9dfe1b0aa3ca3072b1a2c7de16065ec94333a505c
SHA5125f0267e126ee9b997ef1f85212587120d365503c7fe241e8b9a71a35c3a6e68c9ab9cee77f9faeaad09b6b4df793eaa5a166eca04e0d18851b2e6ca47b75f59c