Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
15dd2e5fc9121a9b96e1119909d089f6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
15dd2e5fc9121a9b96e1119909d089f6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15dd2e5fc9121a9b96e1119909d089f6_JaffaCakes118.html
-
Size
34KB
-
MD5
15dd2e5fc9121a9b96e1119909d089f6
-
SHA1
3a2c8b4c1ee90c8e34c8cd78f14ea42bbca7da83
-
SHA256
17c70939189f5fc4ecde4c31a22093a24b1d8f1cd5a218426bddf687066965de
-
SHA512
85c220e4107259a78f78278ab3d6172e3f3d2e483c0ac2e8c269b856c4f45cf61fa824416ff9a2165700ddf717f25124580569aa23caba77c1b4c25aa127b576
-
SSDEEP
384:ZDvI6IF5x5HdOFZU2MJSeu/+AUU/L/O2ksCILVSV+hDij1xwQLjk1P3yCLJOByJh:dgvFnbOgu+AUU/a4KWyWVjh3hcUL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 708 msedge.exe 708 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 708 msedge.exe 708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 708 wrote to memory of 2200 708 msedge.exe 84 PID 708 wrote to memory of 2200 708 msedge.exe 84 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2988 708 msedge.exe 85 PID 708 wrote to memory of 2432 708 msedge.exe 86 PID 708 wrote to memory of 2432 708 msedge.exe 86 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87 PID 708 wrote to memory of 1668 708 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15dd2e5fc9121a9b96e1119909d089f6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9965d46f8,0x7ff9965d4708,0x7ff9965d47182⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,11202299756065525557,5994360725693708139,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,11202299756065525557,5994360725693708139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,11202299756065525557,5994360725693708139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11202299756065525557,5994360725693708139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11202299756065525557,5994360725693708139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,11202299756065525557,5994360725693708139,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
182B
MD5e8d89bf23b32e41f2b4ce7029484d94c
SHA10ea4948e92563fa501faad79999c394950e239fd
SHA25631e2bcfc96bc2a345cc324a71a6eafbe2bc0386c1b11316737e67271b605f847
SHA5129f7dd967bf18f19701dd2c967c7010c9e815fc6aa19c636b04758ad7ce06aef925a969429c2bdcf0e8ff4edd328c2bb93e0f5adb215cc9088ecadebfb1d91d7a
-
Filesize
6KB
MD5d265f2e6dbaf8cad812b16497dbb596e
SHA1cb23c1f43166b78c35f2e5b1df9483ad1b0b400e
SHA256dc5da30cad8774b75b7df6d4abb1cd4c9342f64b04efb042f4d0ddd869426b16
SHA512d7fc1672d4895197640f9e020a3c8c0b7257453121bcc6242e73ec3728059355dcbb3399900995fef5ad3a7c9f5995a0022e456ab67c0978ef1ff90c663a18f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\da29a13d-34ed-492e-9683-e2db6d7830f2.tmp
Filesize5KB
MD5e7e72e4c3bc111f192c4ffce0bc65ef4
SHA13207ed89f4378f99fb91e00643a7eaa669d3f718
SHA25689771155136007b577aba3fd250c455c36dc7057e001ce12007093408926b594
SHA5120b96eeeeb36ec386cfd3571e396cc595a4345009b403bbcc3a5e4360373f92fd12bc1e9b731d82233f509d8e25d4d19290f0c58c1826ded4eb40db77ba54678a
-
Filesize
11KB
MD508a65280b3f224f9319ec9b9fb55cba3
SHA1fa783cb329b0dd7f639c9cd8566edeb7eb97ec92
SHA2567af3a59260d5264578eb941ad9c47fc6aaf12b684fb3c8c7139b46648f99710b
SHA512a589044bf7f41efb65f9fc443b1a5015e24efef1f15a64ba36de7a934dce1efb74737de8413e95ee1e14f353ea6f058776e066f592d904013ada5aaa787f784b