Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
1f864627989629e570b0bbdc3506a838_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1f864627989629e570b0bbdc3506a838_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1f864627989629e570b0bbdc3506a838_JaffaCakes118.html
-
Size
359KB
-
MD5
1f864627989629e570b0bbdc3506a838
-
SHA1
dace1b43889d3afeaf89b0ed6c2e4f7eb6c411a3
-
SHA256
7a37b237b3ed5685901f0b8269d83a30eb02e4de7aab36d96228e416fb0dc61f
-
SHA512
1090070bd72eda46efeefae78961550d849ebf80ba1848e26947849177dfb0214d11481727608c428ce625cb4e9692d6c068e4831b0dd6fb89ab56f6c258430e
-
SSDEEP
6144:SJWsMYod+X3oI+YAAsMYod+X3oI+YgsMYod+X3oI+YQ:S05d+X3p5d+X3Y5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 2188 msedge.exe 2188 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 5116 2188 msedge.exe 83 PID 2188 wrote to memory of 5116 2188 msedge.exe 83 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3824 2188 msedge.exe 85 PID 2188 wrote to memory of 3824 2188 msedge.exe 85 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86 PID 2188 wrote to memory of 3188 2188 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1f864627989629e570b0bbdc3506a838_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf95b46f8,0x7ffdf95b4708,0x7ffdf95b47182⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5463716864001528581,6337886263554701645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5463716864001528581,6337886263554701645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5463716864001528581,6337886263554701645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5463716864001528581,6337886263554701645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5463716864001528581,6337886263554701645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5463716864001528581,6337886263554701645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD572bf32855d11654781ed000287cb2a34
SHA1d0f5d79963826e0787c3a95501fd9ccaa98f6ccd
SHA256fcc4d41b77a011b23d8ac7a56e1e8d56f802763717aa08c09cd2fde5de07b9d0
SHA5120c7a3ac90a6c5bc31b37560e2e87b23e7dda8c8a9eeddd80f7fd63d6fc3754b819780a8f53a73bc6f79ff4966123f98751ff9a381092c876d0f0b38c16f29366
-
Filesize
5KB
MD5017919d81534daf90d36503830aca330
SHA12652ae3f17faec38b4a0cced533611333ba48fba
SHA2569c7cd55de03883f314797eddd01538f294d3acb916b70f77c1c6d69044b7a58c
SHA51219974a5967f8f2211d2a22fbe14ba7ce6dcad0e61cba80b40d80c8cc85928000d45d301a38821cbf37845b0de7dd4e47bfcd933439b089abc214e570197cb019
-
Filesize
6KB
MD55aea6301e8c7f04a16593c611babdffb
SHA16e94ea0c350fb061b01a277b61f718a72a5afc3b
SHA256529ed02fe53d8e8d87c977af93c33c1f944b90ce157fe3107ce9f2cd4c1a17aa
SHA51262d0aa318f5d72e097e519010b5cfe3200bb1009c8e18d391d8a03e2805cb6d283cab77a3a9342a3d7fdab89e12f457261d990e50e45cfb0a516397fd51b3105
-
Filesize
11KB
MD52ca0b340619ddb044be01f1331010425
SHA1efed9dfa2f4d7874c1be79c4fc611fe37a90a3b7
SHA2563971a272ada2cd4ac40d5f532cd1cdeb1a01c73b3202bb4ab47cf0139df3b6d3
SHA51261990b22530e323c4ed85298a5575d72e7b7e11a1fa4fbd494df5d6110a0b40c48d42c754def3f598b0e4f53d5bd58acfb348e45c2e1aaf070ed656da8798968