Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
14c4a3376be11aa242fd2deef281ddfe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14c4a3376be11aa242fd2deef281ddfe_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14c4a3376be11aa242fd2deef281ddfe_JaffaCakes118.html
-
Size
19KB
-
MD5
14c4a3376be11aa242fd2deef281ddfe
-
SHA1
2b4ddd84f40a438e30064c3fa4f69088ddfd631e
-
SHA256
4c9d09471ff8769dee303497bf0651105219fcb283ec95b579aef0c6408f4f30
-
SHA512
d1c405eefabe5bfb2a0f4bff1c718524238a62305e696f777b3ff136b809b7433dc049f3222b13f1b6eb60150bbbc12340f3e9bc16461610a9c4c7483f41c220
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIB43zUnjBhZj82qDB8:SIMd0I5nO9HNsvZYxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2112 msedge.exe 2112 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3816 2112 msedge.exe 83 PID 2112 wrote to memory of 3816 2112 msedge.exe 83 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 3348 2112 msedge.exe 84 PID 2112 wrote to memory of 2016 2112 msedge.exe 85 PID 2112 wrote to memory of 2016 2112 msedge.exe 85 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86 PID 2112 wrote to memory of 1788 2112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\14c4a3376be11aa242fd2deef281ddfe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff957be46f8,0x7ff957be4708,0x7ff957be47182⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16020516446750223516,9350735025229112726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16020516446750223516,9350735025229112726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16020516446750223516,9350735025229112726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16020516446750223516,9350735025229112726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16020516446750223516,9350735025229112726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16020516446750223516,9350735025229112726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
5KB
MD5333a6c4dc6772a9de75301fc2804c622
SHA1669eb0ad46adaf8227efbfa775ebb9fc5ff7d1d6
SHA2564b3099cba32d36581cf972afe4aea509fefe2ea5393977f114dd6b4c15078ebe
SHA512cf5bc50f0c10be865b3b0fb53fcba66fa50d3d033076c85cec3a857605d5d103f67b7b343f5ba013912fb93cca64eaed48dff7e4589368025d1e3b09c3bacfb6
-
Filesize
6KB
MD55fa45e63098f470510df10847a55062e
SHA13dbdeb6b9500075d473f14ecf2276f327e0b48e5
SHA256c59fa6879025050f573e3d2bdea41f6aa64da27c3fb25472672b1749563f9b18
SHA5122f85c49bd1349def22ca82b0b55a5cdd44ed5d61fc019ed0d2f39f71fbbee57dc338577f90380f4e8374fd93707cc3a8d8015ecdb181d6fdc82b8198cfae2e32
-
Filesize
6KB
MD512c5579b299e78985c78ca8e43c15b63
SHA18bc351773e71f0aa2e22e8b7aa2fdafd54795019
SHA25655983882659145a763a10be91c3ea5871f5fff25e61a39f21bd16d30f603c228
SHA51201f267e2efa3e867acf510c0bb86680d98ed4c82e40fb5905633552bc242298f2b5846ee13fe220c748d44e2a56d0ed41ef18660a1d7041817050519e818ea94
-
Filesize
11KB
MD547fac8dfa1df8db6087c49066cf91ff0
SHA12cacfbe62223a14f388e2a083c77795e20a0ed98
SHA2565e89def9127ed85263a1ed4739af57db13ff1cb7e41f2ad8859f7d723858da0a
SHA5123dec8fbe0e1c3fab35d873925c51d1b0f2aeebb34e9e511f097e357d46bdabb1a817c261a6dac445bd07806f6b757f649d6906f0e2e8d35f3bd0cf9657f98ec6