Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
141f883724a0ebdb9e6bb74732108b2a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
141f883724a0ebdb9e6bb74732108b2a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
141f883724a0ebdb9e6bb74732108b2a_JaffaCakes118.html
-
Size
268KB
-
MD5
141f883724a0ebdb9e6bb74732108b2a
-
SHA1
2aefa02a77070f861a1a28387011b46a93a2b3ec
-
SHA256
f53ea9dd93427ce2ed1d556e0daac0bfec5206c3c08fbd1102d47e216d4cdc0f
-
SHA512
343c376ab51dc669e93544774eecc576fe8f06167f38dd498953e11711f9a852766da30d783edfd55651dd7bdd7021ac1ed5222fc4245fd8082896c664511b2b
-
SSDEEP
3072:h5M6s/rSfFrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:wb/gZz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3548 msedge.exe 3548 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3548 wrote to memory of 2184 3548 msedge.exe 84 PID 3548 wrote to memory of 2184 3548 msedge.exe 84 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 4308 3548 msedge.exe 85 PID 3548 wrote to memory of 3756 3548 msedge.exe 86 PID 3548 wrote to memory of 3756 3548 msedge.exe 86 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87 PID 3548 wrote to memory of 3424 3548 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\141f883724a0ebdb9e6bb74732108b2a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6f5046f8,0x7ffa6f504708,0x7ffa6f5047182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,878560276814689815,11964961839853922912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,878560276814689815,11964961839853922912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,878560276814689815,11964961839853922912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,878560276814689815,11964961839853922912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,878560276814689815,11964961839853922912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,878560276814689815,11964961839853922912,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
252B
MD516994943be0585bca964bf5dab3998be
SHA172195c2755c43fb136f36d94211bd32f30496865
SHA25679f9db98ad247f615c99e5be29958c8f89dd78cf9bd76036cc5a9d10c9a0c621
SHA512580c6fa4459280a65c0b264f6a2d5c3e9773698a4aa89f2482572680794c8142ce919e7e018cb33f8c7584aefa004650f61263721934772f7daf00b511351e2e
-
Filesize
5KB
MD5e1e1f22983f2267db84fe79e7a60f610
SHA1f1cb49485cbc9d8860071089d6aba3343d841f6c
SHA256815376c69a851c584992ca9992d56efad6b7db4fbf15d5012896380b4fb6c74c
SHA512660ca07ca0d6722f94654591d34c1da60320f1b87a074a6bbb8788821ffd3157c0cad865ac4095dbf28f44d0771de3d4354f04f669e1d3b80fdb14017a5efcfc
-
Filesize
6KB
MD5b891b495a682c8fc95b515cd36b64b19
SHA11d557d7650dcc22699d7e5b5a5ba932fc235b6fb
SHA256ff78c4ddd4af546908eb644af84333f6823c243314fff30b0e18c2c9099eaa3a
SHA512704e2caeb2f90f006e0cfae37fb3431ff629f0e04079abad0887710f38395199d27615875fbea5d9c9e3a025d889f5df43f644ddfd1d63110100b3b0e9f3df16
-
Filesize
6KB
MD5f61d59235fa95c2126ef36108aea5c15
SHA15310a97122eb67eb7c972ec5c5f5e4a92e1da0be
SHA256eb12d4193ebb525a2160e74ccc65963a886d1904adc7adf0c39594df5e361ac6
SHA512506d69454198c554b9db7156f4339b793c3e6e1a1ab960c80aa2b6f826204683b7e5c68533e97ec3ab85116a3270576cded832c6ac21ece79bc11da6f64492d3
-
Filesize
11KB
MD50f4bb83c9023288902f600bd6c138360
SHA14523acbae0540ef60cd0c989a1046ab8acf2dc43
SHA2566a0714dc79f22f28156e54c1bef598c148dda391e5a2c6338576cec63adbe3db
SHA5122b64866d893ce518adabb45fa1479aae68c6e21e4e3a1bc83001bd368eecf73e86a5141c5f8de1f280da55712c4fc07eb1930ead13ab98e0b56c52380ac44412