Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
236f0149930aad840dcae39a306be81c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
236f0149930aad840dcae39a306be81c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
236f0149930aad840dcae39a306be81c_JaffaCakes118.html
-
Size
55KB
-
MD5
236f0149930aad840dcae39a306be81c
-
SHA1
2273b44e1ef53c12be86ff7f0a0113ab18369b12
-
SHA256
a8f00a76f1d16b6fdc949aa2051516ae56c586ef7c7940d94554b125d95bba26
-
SHA512
0dd8e078bc5931a5afe19ab7079dd5b4046a895c0c40ffc207c424d45d0f41d918787df47a4adfb50bbb7e7eb2f186b4141225d260ab2be4a91626aa77a9340d
-
SSDEEP
1536:LKsIgSyEZduB7reguFuW1h9EKwFr61XgaHNkARP:L0gSyynRP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3768 msedge.exe 3768 msedge.exe 828 msedge.exe 828 msedge.exe 1936 identity_helper.exe 1936 identity_helper.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 828 wrote to memory of 4952 828 msedge.exe 84 PID 828 wrote to memory of 4952 828 msedge.exe 84 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 4860 828 msedge.exe 85 PID 828 wrote to memory of 3768 828 msedge.exe 86 PID 828 wrote to memory of 3768 828 msedge.exe 86 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87 PID 828 wrote to memory of 4896 828 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\236f0149930aad840dcae39a306be81c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15753559339415452743,4842725479530396469,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD583f63b37604aaff90972bce0897a3c85
SHA101e521925a9f50d006d58fac9c7320057e948342
SHA2563473574205a08b5770ad3a73102731cd4f85d0478b6e71d1d947ac0fd9679706
SHA512b68a419aaab7a59ed895c63597afa169a32b423e7e446e32956fae22ce600defdda27af08bbb9178fb769bc8cc13ce8bacaaeae5c9d5def1e56220e57c3cf5f8
-
Filesize
6KB
MD55d61c6456f56555a5545a3d6faabb904
SHA16c9a7d48aa0ef52f3a3739ff3e35c4ffad89a60d
SHA256332bb355a6b0612d1f0606dfb5b46ead57f7b728342fcc2f7a66e3bf89183128
SHA5123a6dbe589db2970b7f363e825006ecdac2ccda1aa3012596e5aed6afb1af78c094a1eaaa5117f51121010568d369a27fafec21f05063ffc9b4990ac9e158125a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD535832f3a205b49cbb8dfa8d35142e828
SHA18d649f9699bb0d47f2b29f5aa94fede397973eef
SHA256e0455453fbf3cdea870ea3e4d469458b6c331c71e0665fbfe860f86d7eb38d37
SHA5125afa4b44a682fe8ada0d7b10e0c5e1b2097d91bba9d28047af2d3f512e81556074a59cc4a10f8993f50b29e28ae9ce701cd5046af5087774619285f9eb48393a