Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
27b3eafc235fc35a269a2ae96fcdcddb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27b3eafc235fc35a269a2ae96fcdcddb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27b3eafc235fc35a269a2ae96fcdcddb_JaffaCakes118.html
-
Size
214KB
-
MD5
27b3eafc235fc35a269a2ae96fcdcddb
-
SHA1
80c02ba6662a38c2173fa19712fa0e1863f35880
-
SHA256
0177c1d5debc3efb7b1a3222e2064af5696eb6c6ee62ee156d3d1bee0f7b8072
-
SHA512
32d9831367b38fbf1662db45630cb439480fc662b2978e956551ec9f9a10bc0426ffd2ff9b40cab22629855525dbd232976b8c66308baa448638081ff88bb912
-
SSDEEP
3072:8rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ3:kz9VxLY7iAVLTBQJl3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 1656 msedge.exe 1656 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2536 1656 msedge.exe 79 PID 1656 wrote to memory of 2536 1656 msedge.exe 79 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 1168 1656 msedge.exe 81 PID 1656 wrote to memory of 4520 1656 msedge.exe 82 PID 1656 wrote to memory of 4520 1656 msedge.exe 82 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83 PID 1656 wrote to memory of 1252 1656 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\27b3eafc235fc35a269a2ae96fcdcddb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9019446f8,0x7ff901944708,0x7ff9019447182⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3447769958643773390,6967950714044490475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3447769958643773390,6967950714044490475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3447769958643773390,6967950714044490475,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3447769958643773390,6967950714044490475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3447769958643773390,6967950714044490475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3447769958643773390,6967950714044490475,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5117986efc6d7ca1b93838034719bc89b
SHA1c50af1d4d88d8fd827d40f5879a212c6c4973e37
SHA2563518b3c9022e630f81759b3152383ace1c33431f927e6a6efedc5c37c8746589
SHA5127d943c2f625c72ece0a2180fb218a9f7048d96ebe3b5ed95ed01e7a916059e4a9f90caadc7c9aea016f6048241419a1ca73cfdace067b8482d69073140e9a5fe
-
Filesize
6KB
MD5b2a940678358271e22981472f2c3f5d3
SHA1e84ec6a975047226b3f5bf13c51f8b18779f73b7
SHA25654d147422e2b0bbf28784bb15bcbe1598345157fcf28567af511fd153efec33b
SHA5129069696205212f07d7f19f957880975c4462e202bb1b65dfc972bd4c42406295c4b59f56e27e418cb722980e34f586898318059868c15279c7668ede82282258
-
Filesize
6KB
MD584ef016f030ae2a4f97b430551057163
SHA1baa6b97e308caa4f4477d63db33e6162e197eb1f
SHA256653ee514455f0bf8c13b41ceb95fd822653a19cfd556fbe59b42e7c0faad3933
SHA5120945ec83bcd8b2083481864bd03fdafea8251dc403cfee833d21cb0a858e5f7d70cdd96899a31dbfe50feacf59607f10ac828b2bf8c16cd5dcf2d43d79050b81
-
Filesize
11KB
MD5d2c7a322b03e707517a1f729d8692a1d
SHA192dedb7e71234c978a1cbcf470adc9ea14334313
SHA256eb46f4fca1c6dfbb039c210679da0ac85c7cd157a466a72b7525dc07f8d240ce
SHA512687b35b44bd0552c3b8b5140e61923a8cf07b7e733d0fa574f03417eb6539acf81c35d922719f67f3c393d32ec6060bb590585da90da69ae80a2a33f06465b19