Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html
-
Size
51KB
-
MD5
16d1b2ff6f8896b20f8c2017674c9b8a
-
SHA1
d475cf435d8eefedc3523988fc09a22fe0c8db8a
-
SHA256
30f71681e090996069f87d46f46462d530ad7aa191da71136c1fb2a3262b28d0
-
SHA512
c132d81a3b9922b07876d545bffa9de5e46914c3f27fab2d2928c294006559661584320465c826ddf9d7dbde922c43f3aa85d1e84a3f902c241935f3bab4e30d
-
SSDEEP
1536:rTIE1XIEqZx00Ql/K81VrO0BkE8XKS1yHxBwRQTev:rMZMrQ1MxB/E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 3012 msedge.exe 3012 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4508 3012 msedge.exe 83 PID 3012 wrote to memory of 4508 3012 msedge.exe 83 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 2824 3012 msedge.exe 84 PID 3012 wrote to memory of 1732 3012 msedge.exe 85 PID 3012 wrote to memory of 1732 3012 msedge.exe 85 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86 PID 3012 wrote to memory of 2136 3012 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeea9c46f8,0x7ffeea9c4708,0x7ffeea9c47182⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7526405811904193527,12901143459332837371,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7526405811904193527,12901143459332837371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7526405811904193527,12901143459332837371,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7526405811904193527,12901143459332837371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7526405811904193527,12901143459332837371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7526405811904193527,12901143459332837371,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
304B
MD599a899dc0c3807aa16d2a0b0b47b7356
SHA11b41377e2342d8fb19a2cc0d5d9559d602bd1c40
SHA256fef1d3a399384febd81edd8b3220a955aa9339b067801312ae75e1db2fa13182
SHA512ddf29b3c5a77b54bdfd2fd926ee344ad8787f6921c29c15c1642a4119bbf8d9a0c891ea56c5ba0260d641e902932635947542b33ef1a4fa1a649716156a66455
-
Filesize
6KB
MD5e8b1f66e89a470af2dbc7c9c0c046d1e
SHA1ad5b707e96fe0c8d93bde67466930c9a95569b56
SHA256cf7620c119a3a3e0a1107acdc51d10bc9b0049051e1c807c5f8c9915c802453f
SHA5127ec499fea5bf424cfc9d50c16fb609e7b8e7a957c4f6aa4c39b52bf53dffd95ec43d1521f832c9236e77f7c7fc25be5f70634d2e96b00113c3634356cdfd29fd
-
Filesize
5KB
MD572645f49183dce8ad10f616d95ac4858
SHA111975b58108d32f5bbf42d34867a13af88e9bfb0
SHA2561113355a8ea485545b12e16f0c3e48b9863268ea9c1374bb0781f905c21066aa
SHA5125bef243b3686dafedc58ba27e10036918b59351a7acae8c0d84998a884be43f2c0eca42b7c97a7e785683c78952110f52fdbb5601be151165acc036cce58f234
-
Filesize
11KB
MD5d627db490ee35cb95052a4948919acdf
SHA13364994e4a420c292c47e6409d31f09c9fb73024
SHA25632010040c30d4653256c7539d28189575673abac278035733caa08eedde2901b
SHA512c3a57d11b9728ec11dc49baae2e3cf98b5f2f75b2a077347de4d6d5e4dfe6cd596382ac05d0639b45ae5d2d2fcf30baa01cb083c17ca376b7c6ee20a3013a9f5