Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
1eb40b44396a1bf28213666d5313f81e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1eb40b44396a1bf28213666d5313f81e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1eb40b44396a1bf28213666d5313f81e_JaffaCakes118.html
-
Size
18KB
-
MD5
1eb40b44396a1bf28213666d5313f81e
-
SHA1
48c579c6faa8d5ab1e751cc048ec8b08599019aa
-
SHA256
f9eb9627c2dc438c47d5f960ec2411a6290234d737dd5f5f0e77f3c77e3eeca6
-
SHA512
65f281ce1d7121552b939b1d4381d0c3172d0c14626801e8e1e58a285e3e3f7a99ea640af3f98ba6c968249a5a63fe1097692f00742de60bbe8ae3951055c49b
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI64CzUnjBh2Y82qDB8:SIMd0I5nvHFsv2rxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3276 msedge.exe 3276 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 4872 3276 msedge.exe 85 PID 3276 wrote to memory of 4872 3276 msedge.exe 85 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 716 3276 msedge.exe 86 PID 3276 wrote to memory of 3252 3276 msedge.exe 87 PID 3276 wrote to memory of 3252 3276 msedge.exe 87 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88 PID 3276 wrote to memory of 5116 3276 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1eb40b44396a1bf28213666d5313f81e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa5fd46f8,0x7ffaa5fd4708,0x7ffaa5fd47182⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1522154432186943815,11970018574932210675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1522154432186943815,11970018574932210675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1522154432186943815,11970018574932210675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1522154432186943815,11970018574932210675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1522154432186943815,11970018574932210675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1522154432186943815,11970018574932210675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
5KB
MD55a941809ea9c496418c7561ddaa04e12
SHA1ea6fc6d7f8dba7a72014d9ab7263b9300a19a0f4
SHA256f9bff385e9fbd674dcb31cd0e7d918f2dc33ab676d2b2dc4fbf12f0792b403ee
SHA5120576cd51c731299afe6bb3a346c853eacd146ec63a5dd842ec0a95818fe8b6a22503a4cec891762a6dfe3cd101598e18d829251e1ac7c4bed0706c7560c68973
-
Filesize
6KB
MD57fff6598c45b3ee69e9a166b22ffdfd4
SHA1f4fc397f3bdbb8785bc72a9372226e5414bd0893
SHA256e4ba22a2e58590f3f722e0e591ddd4f7429b17d9968771a2ba79466a7dccb8e2
SHA512c895b7721ad4400b0f3e25c4a86f9849d8b55743ac5f525029216a6109b136b8305d793a6c80abbc58971f9937ab8aa384a40d687c38228b982977a20f8e3c57
-
Filesize
6KB
MD5e9e6a3613e876db7dcdbee7e7f277269
SHA17802f9143555152ac7eeda76c65167b0a64b4a1a
SHA256780ca4befb497abf4691b3ed78694e3e1dde5ed59a92cd1e0648c504324f50db
SHA512f309cb271f4cebfefecf5779454e07cb02f1906d6f29c557265427ddd92f2acf2b0c00a105c1c43a950ee861decf3134006632d459e9f51ebb47cb77963b0a20
-
Filesize
11KB
MD5ae46e36115804299099d7c762cccd0d9
SHA1d66ed363609a4a9a4489b629f66164644635ba89
SHA2565eebfcc247d4a243fbacf99a6ac005c89b9e552f8776cd0c18f10ed73eb9d313
SHA512468a28b8641f4bd9429bb3e49949c4735bde4a380e13f0da23f6a7be461171d3a5b22be91d3f4ab757993e2e5d82f83398fcde60fac1a6f935bef40170e174cd