Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
178794a69d8503651445f5dbd4725a4a_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
178794a69d8503651445f5dbd4725a4a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
178794a69d8503651445f5dbd4725a4a_JaffaCakes118.html
-
Size
139KB
-
MD5
178794a69d8503651445f5dbd4725a4a
-
SHA1
aad86848874ca2b02fa23a420626d1f7587f6484
-
SHA256
de6bbe22b8044690bff6e65a33014bc69419d69bfea49645d92040bfc1d710b8
-
SHA512
aead0ca28d5977c4deb4b369fd53a64825d80d51d6245662817b76eb9e792e49e9fd4a4d0b264c7e7a67141cd0064083971752a96d28cd423fee0ffeb209820f
-
SSDEEP
1536:SoN2BQDdl3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SoYu3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 740 msedge.exe 740 msedge.exe 4660 msedge.exe 4660 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4660 wrote to memory of 2044 4660 msedge.exe 85 PID 4660 wrote to memory of 2044 4660 msedge.exe 85 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 1072 4660 msedge.exe 86 PID 4660 wrote to memory of 740 4660 msedge.exe 87 PID 4660 wrote to memory of 740 4660 msedge.exe 87 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88 PID 4660 wrote to memory of 1028 4660 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\178794a69d8503651445f5dbd4725a4a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc18ff46f8,0x7ffc18ff4708,0x7ffc18ff47182⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7170016852446361518,4132616980858110020,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,7170016852446361518,4132616980858110020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,7170016852446361518,4132616980858110020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7170016852446361518,4132616980858110020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7170016852446361518,4132616980858110020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7170016852446361518,4132616980858110020,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD5fd70b20fc03ae2bb2fabe867eca3ab0a
SHA15ed95e603fee496dfa0b2bb9c6a6403204b3e7a9
SHA2563a75a1817347188da1c850541652cc374f317f51107ebaa3fda7b896d2f10153
SHA5122fe663518fefcbda07fc241abdc1dd431eb324e8528c88de3bb3e8cb1e3d6976bf4b4680b7620954ebca476565eacfbfef772a2a47829f413edbe4e6609fabc9
-
Filesize
6KB
MD5dcd7d3aec488f6d8f20cb375f3c5ebf4
SHA12653febad96627394088ac8b08b518865c62c942
SHA256cd41ee82780293d71ebff92458254ebe08ef121f12cf72a49215b5b67ba0ba39
SHA5128d5bf5b92bd540e140a8282456c9cb9d09fe829f4b999ae05ec24329e37fd78ecaff44de9eba1faba78267ede7210be9a5f2928e4f28b8f989b4079b06cf68d0
-
Filesize
11KB
MD5aa12cd245fe0f13bd61072c0448c1a58
SHA13fdbed018eb2d4fd7a0ed9b6f397b4c5c89b4fdb
SHA256165bd05cf79feb13094b9cb5e3f1a0899f2aaacade4a3ae58c45a71b423c3947
SHA51256877f992506a5781f9997b50eaccefdffaeadb9605a0a5cee62943c0e8d0a524ac53a36fe6f646b5acfb50ea41cca1435a628aaccb1ae8c751df65ab3a6160c