Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
280155962effd51233b5343cfa334da9_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
280155962effd51233b5343cfa334da9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
280155962effd51233b5343cfa334da9_JaffaCakes118.html
-
Size
18KB
-
MD5
280155962effd51233b5343cfa334da9
-
SHA1
047bc407723e0fdfbf398ce6ba2ac925af90b85a
-
SHA256
7bb4673c408b80b331fc32cc34aaddda12cdab924207b5f7b31293ef209a839f
-
SHA512
0d315ccde14c96481a24da2a687e9bd257ad1924448fff47030b988a2dcd594bb7bdefb5f4ced3fd353f6bfbf91562a72d4976a24c6da3b79336ad6f8cee37c7
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIo4uzUnjBh6s82qDB8:SIMd0I5nvHLsv6/xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 2804 msedge.exe 2804 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 556 2804 msedge.exe 81 PID 2804 wrote to memory of 556 2804 msedge.exe 81 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4140 2804 msedge.exe 83 PID 2804 wrote to memory of 4312 2804 msedge.exe 84 PID 2804 wrote to memory of 4312 2804 msedge.exe 84 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85 PID 2804 wrote to memory of 3848 2804 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\280155962effd51233b5343cfa334da9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18085582324454281858,11923751359127075626,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,18085582324454281858,11923751359127075626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,18085582324454281858,11923751359127075626,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18085582324454281858,11923751359127075626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18085582324454281858,11923751359127075626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18085582324454281858,11923751359127075626,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5a61b73598b283f0af45a3a37fd3dd631
SHA187bb1b941e6873f6cc27ad3761571ceabd3cbbb1
SHA256a214dc74223f65bd676312c3885a0561fb2738b2bb4fb6e1671e84621e3840e9
SHA512f71c47bab862a86c6964f87a031e16bc0dca2e4ed334598174fd4ce9c8e6993e8c2d8b371c2275288593b1806fc67cb3660998e9d4322338af79cdf20175c02d
-
Filesize
6KB
MD5e8357533184168858dc04d63ff98089e
SHA18ff8da2775ddb4ebbfd6dc375e1f89f20c341657
SHA25660f61426a2174cd9c0d5c27e5bc504b2ed78636eac4a324ed9c8fded741ab9eb
SHA5125a58625f8cb2781031909d318374bce291fb39eb0a79acc1d8ab9bdb9baa3e17bca1d2b1d1dc8e4504fd267cc0a2e90d2c58dec6b5164afdf0df7511aa943ead
-
Filesize
6KB
MD5d5dd1b5f44e0f4d0ebcd7e433d0214c5
SHA1baff2ae249f6d6e4e88b57b2b7514d34f64a87f4
SHA2569ba2214150fc1c1e8d0586f351fd416832ab73b9ea45ccfee00fb84d4ff1528d
SHA512078dd8db042b8662a856f09e3add8903b993486999e64372ab5d7da97e4a567dee940c9c0bf66df6842af655946fee7a9d46936d7218e95f63a5efd154127f1e
-
Filesize
11KB
MD5aa6466f5c4a48e7315f62178ca42ff54
SHA10a8fc15752f70cbd85c58b46e476b16d88a44f24
SHA256a7cca305dec4d0c767d063fb6c68fcf015acbca31b07d4af849d85fb612f30cf
SHA512d5b92e0e188eb576007c737be15476348fa808118cdc8b96e87b5c784b255d1b43cfdb4546de671967ee407f84cecafb92c8cf5da1915f31f0bb0ebf0ff57b40