Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
12743f6a964ec1a20fec6cfe145ad149_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12743f6a964ec1a20fec6cfe145ad149_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12743f6a964ec1a20fec6cfe145ad149_JaffaCakes118.html
-
Size
214KB
-
MD5
12743f6a964ec1a20fec6cfe145ad149
-
SHA1
12ac3607cfe5f62902c8cc085234007050cb21c0
-
SHA256
680f27a9d8074f6061e0be9dbb32271bf11d47ad3c5fe16789272c6dde0bc44d
-
SHA512
7c162d3aa290bbd0b5eef56ebf7f98237fecaef0bef801888014926963d33717915e5daa232b594aaf8c09ab81c593993a5ccbdb35c0af22f50169c402cb4a95
-
SSDEEP
3072:erhB9CyHxX7Be7iAvtLPbAwuBNKifXTJUE:mz9VxLY7iAVLTBQJlx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 1160 msedge.exe 1160 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1688 1160 msedge.exe 83 PID 1160 wrote to memory of 1688 1160 msedge.exe 83 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 1968 1160 msedge.exe 84 PID 1160 wrote to memory of 2608 1160 msedge.exe 85 PID 1160 wrote to memory of 2608 1160 msedge.exe 85 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86 PID 1160 wrote to memory of 1044 1160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12743f6a964ec1a20fec6cfe145ad149_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8355b46f8,0x7ff8355b4708,0x7ff8355b47182⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5127633772382772703,7329023733776745976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5127633772382772703,7329023733776745976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5127633772382772703,7329023733776745976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5127633772382772703,7329023733776745976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5127633772382772703,7329023733776745976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5127633772382772703,7329023733776745976,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
6KB
MD51057d2e5c93f3eaa90dc2ca9351e61ed
SHA1f075fd9372e5423db2dd81c8d2f7432f217f336e
SHA256cb22f2a97452e67a2debc9e5bdd62fd5ef85101f0d29db22277bd1edf55cd57e
SHA51285f8faeb095845a045fd4708c5251daafe3476ccced705b6b9990ba6aecc60899114f697ea975221b85f355d0e3f4952b07ee56b0e6423935f42fd484062601d
-
Filesize
5KB
MD5d02d5571a1e963cfae272745b936c700
SHA1d0e095f948a0350f947a0970df6b9a1076a13597
SHA256cd93b7a95df29be04622d9b4e03b802396f7e0844090a7138c6842ec141acc05
SHA5121416842eb36584d613d5f089536da2cd2c4dc52781d323b7357fd453f8469d3f7fc3d5c262ef97702d45828e0513470982a3bfcf523a774b1edf84f8b09ec89e
-
Filesize
6KB
MD53b78e4602e06ff3b427f484e9ccfce1c
SHA153480ddcabee3a1438c9da11f45830cc4ab112ef
SHA2569a3976503f62aee0b4d369c1a87204eec60196a897f4a92ba58f4879842c0d63
SHA51297b5ebcd455f61f71da86da60ff558dc9f1ed4e94130d1ec36715314cd18a9f752a96a442f33d21927f447dfb5df3e72ac2fa19245cf99a7afe346ffaa6d1688
-
Filesize
11KB
MD50209fa2c4d01bf98a8e6d4b40ad5f338
SHA1e25131006575e3575995c83ff2ad4c755222401c
SHA256cfb60d7e1036d151788ee996c3e392750f5c69134f5f28ed67f89f5302f4e8a4
SHA51292ef0d18234d1e13645a009f0a19e107aace2ecfa6c687c3fd9ec22c0e8b5e61b94602ce39ccf48b7ecb9a308d818ed709dd68e53667d38f7e9e0bdf1c63b215