Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
16722199e2d193d84af188b0e2a9f527_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16722199e2d193d84af188b0e2a9f527_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16722199e2d193d84af188b0e2a9f527_JaffaCakes118.html
-
Size
139KB
-
MD5
16722199e2d193d84af188b0e2a9f527
-
SHA1
485df4bb9affbb3a4d3ab564c2800f15434112a8
-
SHA256
227648fee86bc1f99da76a5f0d227d9e10f59501c9c3ccd42bb9f9643453c116
-
SHA512
b5a301a76e662f954e7ec0a2e5bdcd0d9d5789b0be17ba33be294c749fd1efd4d43ccd86030575daa9c3f5d187c59e95ab1e1c81780b3ef4de1c81aa5aa14a42
-
SSDEEP
1536:SKDKYSBBkl8ByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SKk7hByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 5020 msedge.exe 5020 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1744 5020 msedge.exe 85 PID 5020 wrote to memory of 1744 5020 msedge.exe 85 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3992 5020 msedge.exe 86 PID 5020 wrote to memory of 3140 5020 msedge.exe 87 PID 5020 wrote to memory of 3140 5020 msedge.exe 87 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88 PID 5020 wrote to memory of 1256 5020 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16722199e2d193d84af188b0e2a9f527_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe8d46f8,0x7ffdbe8d4708,0x7ffdbe8d47182⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,5455556588669515993,157719779934957525,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,5455556588669515993,157719779934957525,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,5455556588669515993,157719779934957525,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5455556588669515993,157719779934957525,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5455556588669515993,157719779934957525,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,5455556588669515993,157719779934957525,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
5KB
MD5561acff29b72d94a046575a4602a1a78
SHA10f7329944b0dcc69ab2a5fa24738d51dcd7e5e1e
SHA256b4d23986c255caf594c7e47c135f364027db5f2c9ffb5304561721cae8057287
SHA512163a848033fe86a69eb684c28d67e5463d74ffe0ab737f476c173d8a52bc9b4c2ad65ffd1a19d52931f57c90937c1ea0edf3709e735d5e1c3f80b110bfb0317d
-
Filesize
6KB
MD547bba1c26f0640ddd075e82ea3120889
SHA1934e87b85af0d5d5d41c8494da5c4b17c7f9dbee
SHA256c51ffc09bbbe2ba32cf547f791cbc524d6f9ff497126c108bc0198974dd79185
SHA512de743be63d083e21c3913152436eb11d5d317dd3617baffe00192e5669880836748696e8ff145405c28671a1accd802b89c5c95fa603069807b643d4aa39660c
-
Filesize
11KB
MD55381a6c00a6f3daf220647157d396870
SHA14c209b2b5dfb48752bea9a3cf004846b839d3dfd
SHA2568ee962e4a2fba37595f74da3ac31c6ddff464e6a1d4dec757c7558e2b8eb506b
SHA512572f72a9a341a594949cd8dc072a8361902c4e6cc56fafe97352042032c9e4ad84a949a1c2d6b7b21f8fba0476d058b0c52c05129a9b0aa326270be0f6f5a240