Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
1f9a855d8f0e1b9dfd88c1c81d655caf_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f9a855d8f0e1b9dfd88c1c81d655caf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
1f9a855d8f0e1b9dfd88c1c81d655caf_JaffaCakes118.html
-
Size
18KB
-
MD5
1f9a855d8f0e1b9dfd88c1c81d655caf
-
SHA1
7f4a9d4462fece8ff13e4ebbf0f2f07621045a69
-
SHA256
4720e51296da5b6eaf36a5e574cc9d464b145c8d7a80283a40bef5a986801c59
-
SHA512
b3dc7e9c2f57e7e2b9e3e2d8dffe9475af610fde35c1903500a7cc54a789dfd7a5d1919d2b50dbaee1060b34088cf5b09b5490a6452b493a59ad997f35dd900c
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAID4zzUnjBhhb82qDB8:SIMd0I5nO9H5svhAxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2024 msedge.exe 2024 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2132 2024 msedge.exe 83 PID 2024 wrote to memory of 2132 2024 msedge.exe 83 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 3848 2024 msedge.exe 84 PID 2024 wrote to memory of 2648 2024 msedge.exe 85 PID 2024 wrote to memory of 2648 2024 msedge.exe 85 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86 PID 2024 wrote to memory of 1740 2024 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1f9a855d8f0e1b9dfd88c1c81d655caf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb44b146f8,0x7ffb44b14708,0x7ffb44b147182⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15758060177304613771,9994444578293466628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15758060177304613771,9994444578293466628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15758060177304613771,9994444578293466628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15758060177304613771,9994444578293466628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15758060177304613771,9994444578293466628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15758060177304613771,9994444578293466628,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5cce2254703d76d341ae460545d428e85
SHA11710f97097fc20434a205c30bedb11dab326a12e
SHA256999e4638f5ca9b6d19c00fee2659cbe7702b540dc0bc17d981836978f9076cbd
SHA5128715013e6f24f84f557f9056ae76cb69530f8fe3da810adc25092316842723b629f004a3aababc53564a091b237a4181a7f7f8694ccdb52366df0cd3898898a4
-
Filesize
6KB
MD5d93f432cc3fac2fb898a39b4abe0adc9
SHA12ddad911c9613b6cdb9f9a2050459fd4db227006
SHA256b07692df2f15e2c50e345f4a38b348e00f4e8a03e04fced76348226360ce37ef
SHA5125c3bdf3fd32c9c6667fb4cc9e524305e48ad8cadc55c168418d99d7c78c9c30a38df804a01c08f5b030b678dc4972a17b9748a0cd46754d3b72569bca29d71e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ed8a35d9-de3a-4aef-a588-afe9013081b9.tmp
Filesize6KB
MD5a67fa7e5a19ec28e4b96e41791f74083
SHA159d7a59beb9728bdc7cba5a85fecd64c4585ce9c
SHA2563f3e4fcc9fb9adfe5c0b5971de8bae3d0e62b826694853654c4eba09146c244e
SHA5128b41487ec35335dccfd9dfb49658a46cb3f0ec0cb7d78e495b04580f2456f55faa09ce6f4e989c75f9c71671fa6d86a641dc637d4c8e363949fee392fcba2654
-
Filesize
11KB
MD50bbff1614d3017cf4e31aaad812ca0cd
SHA1e36998f55f3d09e84da0abca505832203de79e13
SHA2561d57706a3d13d9b7678a8d244f6ba3ccbe1dcecf2a6d8a28f0dbceb314961328
SHA51298262e5ede97c9f752cba20e848ab49f5d7d4901caecd86d73f56769038e98e749cba34fabd371a885187acee148b314ff44776cd48e59833eed861f7f00b875