Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
118afea4837c210d31362781b12f8c22_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
118afea4837c210d31362781b12f8c22_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
118afea4837c210d31362781b12f8c22_JaffaCakes118.html
-
Size
687KB
-
MD5
118afea4837c210d31362781b12f8c22
-
SHA1
abaff89ba4e1d72b915d037eda15466b843d846c
-
SHA256
d2c2cff1eb73737b25a6d71667e5a815d118392140e8a5fbae6bdaf3ec940361
-
SHA512
8cf3e0e832814c920dd22246f586cc1a8550eccc05cb66bf7f7ad9e9fc0c8d9733aaa0018acb12fd632ccc72c678d2da7b5c1860700ba44ae2a2f696edfc345c
-
SSDEEP
12288:l5d+X3R8mU9jF05d+X3R8mU9jF+5d+X3R8mU9jFB5d+X3R8mU9jF3:p+Wt9BW+Wt9B8+Wt9Bd+Wt9B3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 4072 msedge.exe 4072 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4660 4072 msedge.exe 83 PID 4072 wrote to memory of 4660 4072 msedge.exe 83 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2560 4072 msedge.exe 84 PID 4072 wrote to memory of 2196 4072 msedge.exe 85 PID 4072 wrote to memory of 2196 4072 msedge.exe 85 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86 PID 4072 wrote to memory of 3856 4072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\118afea4837c210d31362781b12f8c22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc325346f8,0x7ffc32534708,0x7ffc325347182⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,18408398584963383427,14296852598623942655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,18408398584963383427,14296852598623942655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,18408398584963383427,14296852598623942655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18408398584963383427,14296852598623942655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18408398584963383427,14296852598623942655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,18408398584963383427,14296852598623942655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD54c857ea2d42d8c6dd0c6ebd3ecff4a3d
SHA1e2831c1c41212017144b5cfbcd6a57dfd353c9ef
SHA256bd93d72a0ad23e633bd5932faa22aadaf7c179c688738d6b720bc122bb062fdb
SHA512c7c99e4dae6d5431bcbfd8ba14c1f8f9ef86ade969c07bfb12de5c33c2bb4c741c81fb83ce3dede2a8280c56c17352a3968fabab6d4a0fc05d26e3edcd4d8871
-
Filesize
6KB
MD5669e2dd790555d886209729a820f3a70
SHA14b5ec17893b6c197a55522d61f8021bfdcfc7531
SHA25660ae0d881f26709ca45c0777bd69e4aef8a4848f248c538188377989df36306b
SHA512fe2c52b10736c7ccadede6de49400d4db24eb9abef10f00b9ca6eb7a14bf31043b1de34ae8ebd4ea1cbac7d16ceac38f8a00c304a0f8231e9f8b369a5ca91d2b
-
Filesize
11KB
MD50f4d07fbf7a39d8fb54f886df18548f9
SHA12ac1d90e1a9170c1d79a3e74dc819a1e1b3c8ca8
SHA256bea3f5a81320ccb154fa4233df806f339ca9f5c8d7ac3b46ffbd228bcd638795
SHA5129e0b7899b749e118b2c970947cf2e38c906a5f0ef9c57a9dedf51952837650c0093c90bff2c8bdb602bc4d2d0d981eb25103198cd2b569cada7567d3feb45110