Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
148740bb2d2417ed727193e26b1422d7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
148740bb2d2417ed727193e26b1422d7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
148740bb2d2417ed727193e26b1422d7_JaffaCakes118.html
-
Size
139KB
-
MD5
148740bb2d2417ed727193e26b1422d7
-
SHA1
9b9bc3a870e12d6f24bf1fb949d3aa3581f45d3c
-
SHA256
71223acd9416d5eafe6c7110eb5e72afb1ceb235f8b103b6bd3001069bed3113
-
SHA512
2df4da4cb39896c5291d9deba3d33392f84ff2a0bea542ad4ceac236d533079b96ab76000fb92f098c7ac0816db7f3ba27b698369e902b245a83fd31a1c4b742
-
SSDEEP
3072:SfQHD9ayPyfkMY+BES09JXAnyrZalI+YQ:SfQjosMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 3772 msedge.exe 3772 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3772 wrote to memory of 3352 3772 msedge.exe 84 PID 3772 wrote to memory of 3352 3772 msedge.exe 84 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 1820 3772 msedge.exe 85 PID 3772 wrote to memory of 2716 3772 msedge.exe 86 PID 3772 wrote to memory of 2716 3772 msedge.exe 86 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87 PID 3772 wrote to memory of 4388 3772 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\148740bb2d2417ed727193e26b1422d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd919f46f8,0x7ffd919f4708,0x7ffd919f47182⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,87011330524386842,14566537936315784181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,87011330524386842,14566537936315784181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,87011330524386842,14566537936315784181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,87011330524386842,14566537936315784181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,87011330524386842,14566537936315784181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,87011330524386842,14566537936315784181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
5KB
MD528807ed279f38eb5aaa97075bea20326
SHA1ba0da47af2f47804835dc4d8984820a0f28e7f1d
SHA2569e630f5587189112740f0321b96dab538cb2fdd78e3c4ace43066a4dcb3d70f1
SHA51248388e5adef28fe6e321b7a846ba060051d552b5726f9f581b1f777e31ca77e4f237fbfa8aa178f133ae6f76f3442f9bd111fe1579934d92c0dea821abd8bc58
-
Filesize
6KB
MD50a99c487037bca026a753a815581d0cc
SHA1497607db70a498f9f106cc9d0a85d9312eea9970
SHA256bc77330811c576e1e1fa0693eb5f32e4508455468f46075af3249d11d06bb0a0
SHA512ef34cdc9a233169758e06debe90685c54c986ff4e20ea77ac1219fb59c803eb9b5f9a8b8c1ba840c7ad62cec3ac939e88efc527ee51fc29e36f5f5b5d038f3f1
-
Filesize
11KB
MD5bf9311d105aa66b141e099d257efb088
SHA1de39e55cc3074922148c2c091eae37e05362fcc5
SHA256607c52de352412cd55ae782d56b6b81782e092f37a3190e6eeed76952e86d8d3
SHA5125f98724eab61f4a95f60dc4d0dd4ac2a38cfaa688423bdad992cb4105b71f2c2ad101345b5af178248ba3c53c12596b705cfa6ff901dfbbad2fe3c3eadf8bda9