Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
2636a82201c4fb4ba57f927befcc9445_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2636a82201c4fb4ba57f927befcc9445_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2636a82201c4fb4ba57f927befcc9445_JaffaCakes118.html
-
Size
138KB
-
MD5
2636a82201c4fb4ba57f927befcc9445
-
SHA1
dc6e1a343bef892503b3b1911fcedadfc343270a
-
SHA256
6959bae1209cb43840ce63a7fe1680dced44966d00149105d3119f52ff4a30c4
-
SHA512
06bb720b8b8fb62573ef2e86b7a3297d8a511085e4048ee4676171764abe729861725ac0f1d37f5759830bc85f202d7c7597e1e790566bd1186c86456a050af4
-
SSDEEP
3072:SLv82pZezsiCMhLlPTI5nfsvsMrY91EH+Ru3RfBpwbfix:Sb8XTKklrlH+ReRppwbfix
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 3112 msedge.exe 3112 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 2112 3112 msedge.exe 83 PID 3112 wrote to memory of 2112 3112 msedge.exe 83 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 84 PID 3112 wrote to memory of 4248 3112 msedge.exe 85 PID 3112 wrote to memory of 4248 3112 msedge.exe 85 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86 PID 3112 wrote to memory of 3208 3112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2636a82201c4fb4ba57f927befcc9445_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,123719030853605557,1539671853936456787,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,123719030853605557,1539671853936456787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,123719030853605557,1539671853936456787,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,123719030853605557,1539671853936456787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,123719030853605557,1539671853936456787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,123719030853605557,1539671853936456787,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
266B
MD589b056240af807a1278d46f325dc5f62
SHA11e66dd4c9e030c5d2c23047a085822a372f17887
SHA256f5f9f29fbb067a58ba60bebb0f36a61c535a234e45ff52f47f192d2836bac9f7
SHA512109696dba2069f9b711948a93ebb6be8ee851336b14512c613196ca495158e8e53c3ad9bbc07aed6ea037b432f1101492a0e3c761d658f78e6e04d87b2715044
-
Filesize
6KB
MD52535862be5b40f4e5a556c7e47cb4501
SHA12c61c9480d87abf26bb157775fd31c5b4dfddb95
SHA2561b97bb671193b1133612cddfd49ebacbf9e6797ee47f0d33241f03a21b7a92f7
SHA512a15f0237d9a71098c7996cd0c44e074eae1068de741bf00dad8d275458eaa480d8e5c5b861a2eabf21998ec61869e90ac8d23f76106d94eb67b1412210f1e08f
-
Filesize
6KB
MD5b01a69ca4a01d00c100336cdb9bc412c
SHA1a3c60871bc075810e669cc2dae0f71804cc73ec6
SHA2563731d63af37902b8ec4695bdd39a970280e7a2e2062160735d6bb6c0b81cd5f3
SHA512b42adb5896029e25a985061ec62042ec283b5b5d0432e31e7bd6ea0aeca220a30675e20e40670c8c03b193c4da1d7e2891738504679893ddc95fb6ee5c7caa34
-
Filesize
6KB
MD59dc04858c40fb8b41d989639e5520030
SHA1ca6fd1b7646c77ddfffb8c0a6d4dedb952cd5431
SHA2565813ce3a7f5dafc4bf7cd0f3271ba705fd7f48b7985d87f8cdf86d73675cbb5d
SHA512196795af9ee77eccba44407d6add6c4ad91414a102437f29d41ae1ac4bc22d97701e021b9d4fad12f072170b0f18fa4ce91923cd7f52e9e8e8ebca6bf8fdabb2
-
Filesize
11KB
MD504d57765d69aa440e89c7f8a7785ccce
SHA1bc371a06ad2a3520a5e8d0d9fa92f29d439d6805
SHA256d7e212123effe2766331da90cea109e449598df313ae6d896aea1a24dc6290f8
SHA512764d13371674b5456768b1bec84e28721e39023ff162070f9cb75d73bc8ef3b7466f54548cdfcecc7b149acf0a7e7d0265292323a64ba15c602936d30ee9a032