Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
240892461ca472af73950edb1ba643f6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
240892461ca472af73950edb1ba643f6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
240892461ca472af73950edb1ba643f6_JaffaCakes118.html
-
Size
19KB
-
MD5
240892461ca472af73950edb1ba643f6
-
SHA1
5a4d7c0776f382ea4b0cd3b9f8b4fa3ceb54fb5c
-
SHA256
52578e4b8f8acb69b172f70a507833d39e5fb674b8ab40e82e437fee8a6f8e43
-
SHA512
d320f9e35d2a05f5fb7b0a22f69909d3fb0aa2f7d8786f0e0839c37a33cb87aced8271d63c5d016cd1020db5cbd873ced41861588d6b7e24c233dcc370626244
-
SSDEEP
384:SIMd0I5nvHgjHzjfhxRpjEfOssvm0eVxDB8:SEg3A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1808 msedge.exe 1808 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 4184 1808 msedge.exe 84 PID 1808 wrote to memory of 4184 1808 msedge.exe 84 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 5076 1808 msedge.exe 85 PID 1808 wrote to memory of 1620 1808 msedge.exe 86 PID 1808 wrote to memory of 1620 1808 msedge.exe 86 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87 PID 1808 wrote to memory of 2132 1808 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\240892461ca472af73950edb1ba643f6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae8446f8,0x7fffae844708,0x7fffae8447182⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6478798719520632209,16747045746075221182,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,6478798719520632209,16747045746075221182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,6478798719520632209,16747045746075221182,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6478798719520632209,16747045746075221182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6478798719520632209,16747045746075221182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6478798719520632209,16747045746075221182,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD5f66991534e8c3e47e3bc9dbfd9b437b0
SHA1bb50bd85d4849e100152f0d35f409c26ad0ea1e0
SHA256a3c7d492b8bd6f462b38ff97fcf75230ac73368460004c96a1c6befffa0ccaff
SHA512ac141e16c42100d5d55ea62bd59185b288e1fe295cf60706e6db2fe64a9bd38d745efb33eb56035d25beb9c939798fbc7da3ccb323bc536879d5ac3a5d911d47
-
Filesize
6KB
MD55b0010a15edb61e728f3677d6d4901a0
SHA1b84af7b75b44bb7c4b912249cd0c058d18c78244
SHA25662479d53b90d717255689d3571951a8f9d786fd7e9e2e38c622f5ee026894d0e
SHA512eb50e7ae607f57778a86ca6d8764735062f27faa8144bf4d7452b84cf8af15ebbaa2eaf647fc129bb17397501ca079dbb8eefee4bf1b30de58fcd34ccbeb8699
-
Filesize
6KB
MD55f46fc0dfa39e42a2c532069bb5b1026
SHA1871996caccb118839d5d8bc908da19d728348f78
SHA256b79b3b15a0ddcac3083bcdd5ee69300c6fb0930f48fdbbe83df929ce44c149e3
SHA512e3d5a8902a47bb2850e73d049e9f756968ff02296885f9aa6c30398ce1876857fa7be72893f66d3dfc38329fbe5026c472c6ea042881b877a5de539256ffca22
-
Filesize
11KB
MD5d8535b97f4384bcfd48184a82bae91f5
SHA102e892daabc419f217813542a082bf58eec60f4b
SHA25611bd2188f9b0bf176e404d1708666fefb1d1bdd186aa5b8d8c5135d487e818d6
SHA512bb0535ff18648850f891c83c2f4824b2e93defa72f99aff3873f010006672ddf71a3ad6fc13ac9768de0cd5ea197cfd91f56b66873e44fe4798f9a9ea91923c3