Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
120273562542fbe38eb42e6bc7837704_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
120273562542fbe38eb42e6bc7837704_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
120273562542fbe38eb42e6bc7837704_JaffaCakes118.html
-
Size
18KB
-
MD5
120273562542fbe38eb42e6bc7837704
-
SHA1
36f198ee7a68968e272ac2fb11f5e16f6bf5f212
-
SHA256
6391d9c29ed32714111ea8423a53f753312cc7fbbf3a7a043726b72aae54a2ac
-
SHA512
5504b22573d10914c464630cdb4eeed9bd3278e8d34771f0253ef5470812912cbe4fa19e6314441b8201200aebc6178c3e1ff9e59789e308094518ae199ced71
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIa4AzUnjBhke82qDB8:SIMd0I5nvHjsvkNxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 2768 msedge.exe 2768 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1596 2768 msedge.exe 84 PID 2768 wrote to memory of 1596 2768 msedge.exe 84 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 4576 2768 msedge.exe 85 PID 2768 wrote to memory of 3264 2768 msedge.exe 86 PID 2768 wrote to memory of 3264 2768 msedge.exe 86 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87 PID 2768 wrote to memory of 1140 2768 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\120273562542fbe38eb42e6bc7837704_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffdc6a346f8,0x7ffdc6a34708,0x7ffdc6a347182⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11849323445632737663,5244652324541333731,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,11849323445632737663,5244652324541333731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,11849323445632737663,5244652324541333731,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11849323445632737663,5244652324541333731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11849323445632737663,5244652324541333731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11849323445632737663,5244652324541333731,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD5cb3a066b37fbcbee7f5d1b251c6ddcfc
SHA1eb39ab7295daebab745c866800095a001d1530b8
SHA2564a0a41384f377dfcd3a1d4b2b9744f75a7b0ed6e407925b0b353d69f732396c6
SHA51211e7a099b8bd4dfae06092c512170b10868a32d838116d65ac31ec2cc01ea29ccf05d1fa7140e4f9e4b8f4751222011b79e289ed65f3a7fa96a1c744d8784452
-
Filesize
5KB
MD50b3446cabe6749d103e75268cd0a4986
SHA1212414179ac06b069f4ad799c76c9678d920b6ae
SHA256cd2cd065ce5d872c1582f873ad0c5e8308b16eae9ccc6df9ccc6163446c584f7
SHA5121cbaaceb1f1abc8896fc211d633677e4be18af5fa0dfcfedd5d3135cbd82103582440299509da7aa7c4da8c312db4e8633ab720a0eafcf77af048f1c8b402527
-
Filesize
6KB
MD5079db9514627915d6661524213269cd4
SHA196e58fc5a0cfff422dcbbd2f82e6f7f5e068987e
SHA256ec143e3b7124e3c0295a8757c53ee504f00ca35cc5ea4c56e56797df861ae6d6
SHA51243ca0973f6583f7edf8a677d24afda2564c38edc54f783654a211308d14f6f6ba46eb5792f8c02c56380f62dc9bc8878e40c59810c5b80729ec707aafb295c06
-
Filesize
11KB
MD5fdaf95b21e55f2f0a4d88e038764113e
SHA11d7774fd5a6e8600733d5bce8903b74ebf74beb9
SHA256d9f9bf4dd7532e21885296e0980d4ab390c65a38d0a7fa585062ff84e2f0298b
SHA512eab0f9b52f3589514373e0b09aadcc3b0c07890ac20414ce748836cb8261dcaadd4a23864f6b5a314c65eb294524d2e5c40854fd754fe9bfb57ed7fa8c6e9479