Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
259e7ca3d709a57874ef53dbe8bee73d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
259e7ca3d709a57874ef53dbe8bee73d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
259e7ca3d709a57874ef53dbe8bee73d_JaffaCakes118.html
-
Size
221KB
-
MD5
259e7ca3d709a57874ef53dbe8bee73d
-
SHA1
68b8e610b79332ff9405a65eff84b3eb521fa843
-
SHA256
ee294debadfcfc12cfe0ec1c65de61e33f36c19277f7bfd79b577ee7e7046f5c
-
SHA512
0ad7ae5578258931341c4e3eb30781fa40a3b428812e9cfd91ffdcd25b6e1a30e5fff8d15a86a5b613ecd5401d53468efc72bd4f60f65b37423c00a3736cee94
-
SSDEEP
3072:StywPgcpXBY9vyfkMY+BES09JXAnyrZalI+YQ:St7DA8sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 3312 msedge.exe 3312 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 1556 3312 msedge.exe 82 PID 3312 wrote to memory of 1556 3312 msedge.exe 82 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 2636 3312 msedge.exe 83 PID 3312 wrote to memory of 4916 3312 msedge.exe 84 PID 3312 wrote to memory of 4916 3312 msedge.exe 84 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85 PID 3312 wrote to memory of 1304 3312 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\259e7ca3d709a57874ef53dbe8bee73d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84b6d46f8,0x7ff84b6d4708,0x7ff84b6d47182⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1893719868530664648,3182211650224498254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1893719868530664648,3182211650224498254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1893719868530664648,3182211650224498254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1893719868530664648,3182211650224498254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1893719868530664648,3182211650224498254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1893719868530664648,3182211650224498254,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
6KB
MD5757897ae04934b6e62d10b65ebd49bd6
SHA1ce95cd5009a81e84a990caa7835706214d1053b3
SHA256cdec4fd8f62a30d23c4d9923ef5622f822e231b6c98ef99d202bcf2eb4d8452c
SHA512472d147696fb40790f5ceed074810d6739ec8ee95b05ba5deb5df274ea79e00b1a4d24fbf70d0497b587b06a47cc6c4e4dd79b62bfaa3b1bf50e678bd4bde219
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e74d63cd-dafa-48fc-8dbc-cbfa341bc102.tmp
Filesize6KB
MD530d30e727f20d0613e2efff873dbd761
SHA1ab711783e7f9c2a409188c096816de7249a3cd3e
SHA25695cf22cf982d7099c1f9ddb3c7c253a00700b26cce60a8fb0f40759988b95167
SHA512f08816489d1380edb45e749b30e371f74923acaa10b9233ec31da5dde22dd3dccc83f19d70a6298e5a55a9dced25ef6b2fdd32e9c79e2db7e9029ed20fb58f83
-
Filesize
11KB
MD50439f1f9a4824159902319aafa97626d
SHA1e8567285ba154902b4e16cae4d0dac664063790c
SHA256c83f4c57812d55c42faae5fbe79d08a819d3edc3e5912f94c0f4551704b00720
SHA5123c5bd91a7489bf03163b22e7600262c2cae287d3db05c635c1ba9165c6f3c4a79968cc4fd2ed0a03d07facf8a090f68c2a6316188d92f43bdeab28acc77d729a