Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
20b3c7d71f47344341ab29590626ce4b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20b3c7d71f47344341ab29590626ce4b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20b3c7d71f47344341ab29590626ce4b_JaffaCakes118.html
-
Size
240KB
-
MD5
20b3c7d71f47344341ab29590626ce4b
-
SHA1
95c877192b10bd1643144ae12e04b7b9fa195683
-
SHA256
b5808f02e547908898ecee86eed17c5714d7a1e0ce3061e8d85a495ae8f83b86
-
SHA512
ff1e7c52796125a1fd38ad48e92cba7457ddb8e821fa58a094cacdaaaa7374e1d7c556791a7e5fd6686865fc531d11a06371829a79b9abcd8f13fb9d535ac74e
-
SSDEEP
3072:SGCayfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:SGC/sMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 1408 msedge.exe 1408 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1516 1408 msedge.exe 84 PID 1408 wrote to memory of 1516 1408 msedge.exe 84 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4004 1408 msedge.exe 85 PID 1408 wrote to memory of 4756 1408 msedge.exe 86 PID 1408 wrote to memory of 4756 1408 msedge.exe 86 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87 PID 1408 wrote to memory of 1824 1408 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20b3c7d71f47344341ab29590626ce4b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2f8b46f8,0x7ffb2f8b4708,0x7ffb2f8b47182⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7165705003948157035,16675791791592300523,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7165705003948157035,16675791791592300523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7165705003948157035,16675791791592300523,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7165705003948157035,16675791791592300523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7165705003948157035,16675791791592300523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7165705003948157035,16675791791592300523,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59dc60aef38e7832217e7fa02d6f0d9f6
SHA14f8539dc7d5739b36fe976a932338f459d066db6
SHA2568a0ee0b6fafabb256571b691c2faf77c7244945faa749c72124d5eb43a197a32
SHA51218371541811910992c2b84a8eae7e997e8627640bdb60b9e82751389e50931db9b3e206d31f4d9d2dc3ca25ea3a82c0be413ecb0ef3ac227a14e54f406eaa7e7
-
Filesize
152B
MD57ac03b15b68af2d5cb5c8063057cc83e
SHA19b2d4db737f57322ff5c4bbddd765b3177f930ab
SHA256b90d7596301470b389842eecb46bd3a8e614260b0d374d5c35a36afb9c71a700
SHA512a5e9f40dd9040803046b0218fab6b058d49e5e2a3ada315e161fe9fc80ebb8d6d4442ccc1c98d19e561fc7c61bcf43d662fe2231cacacb447876a2113c2e3732
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\55b0b817-a4c2-4479-a1b7-ee76c3a177fb.tmp
Filesize6KB
MD536974c7d74ae0b787afe7966ab33615d
SHA13bd945fd9d5b9e292deb28b6ef9e5d1d24fec39d
SHA25604de373b2c7299376b1ed0942c4ffa9e91a7d51fb65db8ed8ccae92e477ee065
SHA512943646f349bcd02af16f8228ade51ec2d785b0dc4897609f79fc39740e4edff70e513eb5dcb76dd48f7dab9e6d4c73361d9d169873b70b80eb13932ed97a549f
-
Filesize
5KB
MD552c6bdf5598ea1a74176b3c1b3f76537
SHA1de5eb22c3de6c8b55ecbbd51865bd770c2c3568d
SHA2565b5b31cffd32daa58e108bfaa56bb39c986734c2a6fca1d5e16aa035a6a11a33
SHA5128a93755e8081b8ff10c5534626a331a1428212f94c9b3c8b1ec38c92782fa0a9ddf27fa8110cd41d4682f949f47707b0dd411c18fe9f8b1be708954732092f04
-
Filesize
11KB
MD58996701a260d81acd1bfbb479469050b
SHA13adf63895f4c2e71c8049df7cf80b49f0f9e91b9
SHA2563d98504230718ba7263caef73cce466b4a5e66ab61d018dc7be4c6f198b11c97
SHA51203ec72c3381317b28f6956dd443146f41ba1b74afd554f017c05bdf64138e9ffc5b994432a7e9db22861ebe79c5b99b3cdf4ad186ad9b00519a6455df459c680