Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
23c1c06e6f365462a328244a31c6a81c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23c1c06e6f365462a328244a31c6a81c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23c1c06e6f365462a328244a31c6a81c_JaffaCakes118.html
-
Size
463KB
-
MD5
23c1c06e6f365462a328244a31c6a81c
-
SHA1
6e4249fd7481753c0b0ec8ff215702e2c612a144
-
SHA256
0bde47ee190d9e38f2a41286f35bf88f61b24e06ca9b07033bd8db57cc7eaf1a
-
SHA512
6aa44b0c274ccda0c724cb6e507a62edeb6af7d952d468551c31b223b6174d1642f2f399bd656dbd67c3264da6abe2648e2e43bfb12153c0c3c4e3926a8d117d
-
SSDEEP
6144:S+8sMYod+X3oI+Y+tsMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+Yu:/q5d+X3055d+X375d+X315d+X3I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 3220 msedge.exe 3220 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4916 3220 msedge.exe 84 PID 3220 wrote to memory of 4916 3220 msedge.exe 84 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2056 3220 msedge.exe 85 PID 3220 wrote to memory of 2452 3220 msedge.exe 86 PID 3220 wrote to memory of 2452 3220 msedge.exe 86 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87 PID 3220 wrote to memory of 4960 3220 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23c1c06e6f365462a328244a31c6a81c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff369c46f8,0x7fff369c4708,0x7fff369c47182⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13590815019307753574,11141437241255181726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13590815019307753574,11141437241255181726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13590815019307753574,11141437241255181726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13590815019307753574,11141437241255181726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13590815019307753574,11141437241255181726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13590815019307753574,11141437241255181726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD50eb2b7fa242a73332d80be406b238d5f
SHA19f5339faeb938c884c32427fd1e527b47a9ff48f
SHA256f91a3b593a9dba733170c16acd542b018b49739b0ed457670f42b265030fe554
SHA512745e484592144cae5574a539baf8a80391884484c53722a26bd4adaea7560ae632a3aa01920a7dea17208e1208e340df0333273b44e0637c3203ff040d24c3a9
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
5KB
MD5bd62b1da116152b4f214212844f1bf80
SHA1c3e602144882d222d1bdb3e8e8419b6e639d9b4b
SHA256e823deadf96078a0c464cb0e22c2b1b00e280b8af6c34d24dbf8199e4b193ba0
SHA512f74a0726f43b2d0349596ba11960cbc8b0c89a432025c7dba4f9139888eaf0fff50d59fcd3c27b8868951464d3b0ced539d4c338ed46336e622dc5767fc962bc
-
Filesize
6KB
MD50f96df591941caf42b002f50b93e2d9d
SHA1fba36814eefb420a778f4ea77bb19fd7fc98d759
SHA2562a347cba0f5df01233f8a07fa7114bbe12e4ccbd560828b9dc5047595e4083c9
SHA512fd0198e9fbaa915ce5f99be2c954d4372a859de91592823da998fa0aa50cbdecf3b7b4cc3970501aae45be9d3a3449c0cdbed3645b86acfe9beabbd97d887e21