Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
2532e0d6de58db0790c2ae66869e04f4_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2532e0d6de58db0790c2ae66869e04f4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2532e0d6de58db0790c2ae66869e04f4_JaffaCakes118.html
-
Size
214KB
-
MD5
2532e0d6de58db0790c2ae66869e04f4
-
SHA1
ab402a93dc7dd66f76761b63faba7d57b381be46
-
SHA256
e164b997ecca6aa18263e5b42271686f2ac67da159f32cba48500837688b014e
-
SHA512
7045f9518e0d841fd5574bc4215d4b15ba5293dd6a4f1d019b05ac662b00464d8f35b80f407c55833f43c7d55076899e5d583ae9ee9159b499294ea604efbc2d
-
SSDEEP
3072:vrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJxvH:jz9VxLY7iAVLTBQJlx/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 4872 msedge.exe 4872 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 3544 4872 msedge.exe 79 PID 4872 wrote to memory of 3544 4872 msedge.exe 79 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2864 4872 msedge.exe 81 PID 4872 wrote to memory of 2436 4872 msedge.exe 82 PID 4872 wrote to memory of 2436 4872 msedge.exe 82 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83 PID 4872 wrote to memory of 4564 4872 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2532e0d6de58db0790c2ae66869e04f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe873846f8,0x7ffe87384708,0x7ffe873847182⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4677623020190036149,512283774504692127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,4677623020190036149,512283774504692127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,4677623020190036149,512283774504692127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4677623020190036149,512283774504692127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4677623020190036149,512283774504692127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4677623020190036149,512283774504692127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD532b03f441a110616493a6e4f4c9a7877
SHA199186a4bd071a0c9e0b48b95acd03f5460e0d220
SHA25670c2ce551d2cfeff7735f585acf3d76c4f1d2a794c66bd49dde7800710b538f3
SHA512b312e95013229a5194f93d1676d21fb7375589d428932d5f4c46e7e2f5f371c3074df599f47b85e81a789d51b36a49bec1902ede1ef0305d2bd0d19250374fe4
-
Filesize
6KB
MD518444679358dc1d2516207a7eafc143c
SHA1a412de06392fe19439043a078dbb11d0bcd5d4fb
SHA256455200b7e2573672c24fc4a65e092d677cb9325c9024c6acf2533f6db30c6699
SHA512f6493fdfd583171eab563322aafeaf9d61af192c8fa6844dc403b4cb3824adad5fc30f2f53b936fc15eb53c3141e7699fa68a103e2f1ca437c644a736dda9e05
-
Filesize
6KB
MD5af17b3bb5f28fde667980c614fba04f0
SHA1ea484f4371988bc3a930dd0c20391dbe6d2046fe
SHA2560661ebcc641f6f09ec091bda9107743ca8866fa86748fc5e65e87b7f18e8fac2
SHA512cd39fdf7f15180de6e37dae75a8184335ac15d42e188b92b1f832e11f35b603a4b7e577bb77bc1631aacdb856120dbf6775d0b1aa3e889c89f763d1de1222b29
-
Filesize
11KB
MD547c75325a03d8fed67e2bc75b45a0a10
SHA16997e760321f31be2af7308eeebd6a1e7da131ef
SHA25659c889e99fbe2d488e94d0d9361f2696e7041d0d0c0df90e9423528a3e0f9de9
SHA512c5074303c44331fc8a897191c6ea0f93350e373d770f8142da07dab097886e5a7c41183868adcb964f4cdf975787773ff621870b2ee4fa870670765e03b22503