Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
13d965b9f8dbb810c93aca2a99cc433b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13d965b9f8dbb810c93aca2a99cc433b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
13d965b9f8dbb810c93aca2a99cc433b_JaffaCakes118.html
-
Size
138KB
-
MD5
13d965b9f8dbb810c93aca2a99cc433b
-
SHA1
34941ec6b05b7f566c651aa9be69f353b7cd311e
-
SHA256
53eef0ca3680d782d7a8e50b2de5eb29f1eada735c01750483d6b7dedc835902
-
SHA512
344df2927f6f4deb4cd9a80381e7be2472e7491eb613ee855339516f8bb9de44629f5fe75ff994aceaa9a4f6c686202fd2682bd0c49d168b5cc98924537b6b3a
-
SSDEEP
1536:S194YUulKyYyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:S1Q9yYyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 804 msedge.exe 804 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 3932 804 msedge.exe 83 PID 804 wrote to memory of 3932 804 msedge.exe 83 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 1908 804 msedge.exe 84 PID 804 wrote to memory of 2476 804 msedge.exe 85 PID 804 wrote to memory of 2476 804 msedge.exe 85 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86 PID 804 wrote to memory of 1016 804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13d965b9f8dbb810c93aca2a99cc433b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdcb646f8,0x7ffbdcb64708,0x7ffbdcb647182⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,7429334709934950312,16202221151207127648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,7429334709934950312,16202221151207127648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,7429334709934950312,16202221151207127648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,7429334709934950312,16202221151207127648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,7429334709934950312,16202221151207127648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,7429334709934950312,16202221151207127648,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
6KB
MD5a316f27ccfa2aac31f3e1483fbb4d414
SHA1bb95a9d34d3f997d79f97ba87c51da718f643e33
SHA2560fcb1db939296e4209fb1b0286a95baf1742206e0ea481642e7e6d3b2c6b6cec
SHA512ac1f1ce4e7e6571ada1b1dec8e96c35bd45b9898769547a8b54eb3a5c84062b4cc54b7a16253ab2edb73c8616f6adf0300d3985b49776f288245e73587f826dc
-
Filesize
6KB
MD594ad5ec2bb52fb8358041adae810bd4a
SHA142ac70bbbde714c755fd2d1eec02bff051c21df6
SHA256e616c64854dcfb68aa30b4a84b9dbeb9bff0a86b0ba86c1188bf8508521304bc
SHA512704ec82db3cc791583c048dc389364bbad8a29a4d15b0d0b1609dcb126bbd9444e6407dfc677e3191d341b61f715732c5707c016181feed74a0ac13c2b7d2fdd
-
Filesize
11KB
MD52fffeca427c201540f02723ad16cfccf
SHA10bf3e2e99558cc361f3b186ce0cfeb690f6541c6
SHA2563fc4ae81c21cfaeadf4e1a8b67e0407288083f611db5820c503c9954c2f2dae7
SHA512b0d44721c72c4100db8963386a71c343f16ef5e1cf6f6875ebf96442f7960db7063827c023034a7eff842f6bab343d356176a796669b8773268e858e21d48a97