Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
25d81e0fc5fb26c4bfeb563d9c8cc4eb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25d81e0fc5fb26c4bfeb563d9c8cc4eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
25d81e0fc5fb26c4bfeb563d9c8cc4eb_JaffaCakes118.html
-
Size
134KB
-
MD5
25d81e0fc5fb26c4bfeb563d9c8cc4eb
-
SHA1
d84d9dbe2a6039bb81cb0fc2a97081b0987a9aa3
-
SHA256
823704e250374069e51def67fccdf895007d06c0cf2929556fc86e8607d6f2f9
-
SHA512
d4b7a94bfbb02b6eade7ae83f7060619f762b9142550df928a8e5a8fe474e45a702c97d7fff249ecf27c39e62d099ab17f3412bfa53ab50278df6f10c3dcdbdb
-
SSDEEP
3072:tuyCZNciY4bdLDI93oO8a3q8GxLy+IXlpOi7x5WOUkw7SJ1S:7EO8tkw7v
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 3632 msedge.exe 3632 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1384 3632 msedge.exe 80 PID 3632 wrote to memory of 1384 3632 msedge.exe 80 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 2488 3632 msedge.exe 82 PID 3632 wrote to memory of 1312 3632 msedge.exe 83 PID 3632 wrote to memory of 1312 3632 msedge.exe 83 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84 PID 3632 wrote to memory of 1420 3632 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25d81e0fc5fb26c4bfeb563d9c8cc4eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9f2146f8,0x7fff9f214708,0x7fff9f2147182⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,12526122529085615951,12339371018269740649,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,12526122529085615951,12339371018269740649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,12526122529085615951,12339371018269740649,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12526122529085615951,12339371018269740649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12526122529085615951,12339371018269740649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,12526122529085615951,12339371018269740649,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
473B
MD5de024a2ddda2240bf972eee1cd2ddae6
SHA185f9fbd20ba59f951198110dfc9ca9c1eef944f0
SHA25664979d48a22db699966b1a0852cdcc5cad720d1a85058cbe758262e385fec816
SHA512dfae6ce89f13112f1bf4d0f9a339e288c1598c67c5ba090d2b1d3b392c96510798318c1ab0ed530e1418db2e0a9fc369987bfd3914e078af718abb7798003da5
-
Filesize
6KB
MD524b90a6bf87b6ca8bead3044f4ad02ce
SHA1518e3ba92674b570fcbc85fb578d906a100a6259
SHA256f703be041299941f39889e49f3adb87174b2dd8ac9796159fff654d8274ba2ee
SHA51250ba90112d75f05943942063524a01c3c99f969eb64d1f8a631397c46f0271d1b5b9b15d4ee8eb76075e818ed108d4b13e5e2311b55aa693af139011a83546a0
-
Filesize
6KB
MD56dd097369d438185df908950e34fe585
SHA1b1d7a99958c663beb8bda1964aed264673447c17
SHA256bc28ceecc61ab2ec568a0d82f24961cca03093d1cb772de9eb242781d55cd6ff
SHA51274e21bf6df5cd794c2a8b3b7863609ae37b9c1f1a1e4730b73831c4918bce8ec2b5adb849a77d534340c09c1f5ab10a4eab6ff087cd87d6fe4cd7861cda8514d
-
Filesize
11KB
MD5f4f3b977c577e7711e5721cf75bd076e
SHA1bfa28e427099d3b438d7747c204c132dd1e5d50b
SHA256d364c47b635bf2fdbef021654df4feb4b071db7c5a044ab645cd01e7cb7dffd0
SHA512297c420d93ef634508c8b7aadd168fcf78b9d9f921ef9a6fa30ddb4acb1f4cb2567ec0a8a1d18c5cc5fa66e3c659803b0cba5c0ac2c78f062b73bc61587ad623