Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
22fc1956eb658502b685c09820d85897_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22fc1956eb658502b685c09820d85897_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22fc1956eb658502b685c09820d85897_JaffaCakes118.html
-
Size
213KB
-
MD5
22fc1956eb658502b685c09820d85897
-
SHA1
fe38f3ea1f55408cf0a6af86eef74d73e368b2e6
-
SHA256
5fe49f295e1976637fd2be08f54a4be86acfb2a2a98deda6d8ae0899494283f4
-
SHA512
b6a9c143828621aeb1264e48c7213b71c91d43f077070f74e60e06f667c4fb1c9e1e84cd87019a7a9ddf154bfe5f4389ff15b5d7b7db3a8beab7fa3d215de98b
-
SSDEEP
3072:S0Zm6QY4+7wyfkMY+BES09JXAnyrZalI+YQ:S0UwtsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4264 msedge.exe 4264 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 744 4264 msedge.exe 84 PID 4264 wrote to memory of 744 4264 msedge.exe 84 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 5076 4264 msedge.exe 85 PID 4264 wrote to memory of 4356 4264 msedge.exe 86 PID 4264 wrote to memory of 4356 4264 msedge.exe 86 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87 PID 4264 wrote to memory of 4168 4264 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22fc1956eb658502b685c09820d85897_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffabc546f8,0x7fffabc54708,0x7fffabc547182⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16804404677741922065,17765637906323058482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16804404677741922065,17765637906323058482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16804404677741922065,17765637906323058482,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16804404677741922065,17765637906323058482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16804404677741922065,17765637906323058482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16804404677741922065,17765637906323058482,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD56ea8ac2c2126ef01d5e9cfa85c3ba40d
SHA16b8e9f1c12a0a31e6fdc553cc7370762838acb39
SHA256338cb7da7b26409e1685033e9a5f5e37251e2589063ab1b193c02fa785af0de6
SHA51240be3675fab5ea9e938e958e252159225429750a51fc57b430b69b78b29de84e278b523a5ecebb8882e068b09faef0d22db23af2d1909c09d59493a45c2f0e25
-
Filesize
6KB
MD54970fee468d3562c3133222f5a50842b
SHA141424e892ac74b5cdd27df0ff115c2495aab48c6
SHA256dd54cf241a3831465a97f57e6dea888aabf9a759c5665aa6592b13d521775acb
SHA512efc49c4d12b49ebbf1a64f727799694ce441c3c09b50f27c525a5fdfbdf3bd1b014b53b116b9413b93a2338f5911fe2f1d2cb71c9eb7d029c86699de5c862651
-
Filesize
11KB
MD5b318cc65142a1241211bfab200d394f6
SHA150281850e5798ef66907f4b9af1241f09da3f9ea
SHA256025515c3792fabbfc39bba34cfc295e82ac533f3820c6f32f9702e52ae7c95a3
SHA512493fdab8558606302b2da19f18c11eb471e903c6bf83a6d6f4b1985bf586e971f6674bbd7f13cce864a1b7ba8f5f3f1aa266112a27f73b19e861d6a895fca4f7