Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
291bd2a49a67590f3cfacd8a293be0eb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
291bd2a49a67590f3cfacd8a293be0eb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
291bd2a49a67590f3cfacd8a293be0eb_JaffaCakes118.html
-
Size
213KB
-
MD5
291bd2a49a67590f3cfacd8a293be0eb
-
SHA1
8c668d64120dc19bb94ece0ad01e49699f3da990
-
SHA256
2d9b37d920eca34c69ed25ca6288e1812eb0d427dd2e860dc836f8090a92af7f
-
SHA512
e3bbebcb4173f2d5092968dd8bc43092bf7a64f45f2d970f208a1ce65576050f96c9b93a525553c107f1509cb7a9a04b949d38b02e7b0edd939a59945d83ca46
-
SSDEEP
3072:SoujU5WDm75yfkMY+BES09JXAnyrZalI+YQ:SoTBcsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 2620 msedge.exe 2620 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2660 2620 msedge.exe 84 PID 2620 wrote to memory of 2660 2620 msedge.exe 84 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 3812 2620 msedge.exe 87 PID 2620 wrote to memory of 4996 2620 msedge.exe 88 PID 2620 wrote to memory of 4996 2620 msedge.exe 88 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89 PID 2620 wrote to memory of 4644 2620 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\291bd2a49a67590f3cfacd8a293be0eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff871a346f8,0x7ff871a34708,0x7ff871a347182⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17766794856474891045,6366423806247840083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17766794856474891045,6366423806247840083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17766794856474891045,6366423806247840083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17766794856474891045,6366423806247840083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17766794856474891045,6366423806247840083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17766794856474891045,6366423806247840083,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD551a2bf9952d8d9250c1a62ea31719dea
SHA117e4211e0dac3a724be1502d635b97e4664f266a
SHA2560a93988aa0078d64063e0adb858abb3a4eeee5777ac6955f1bf70221630548ae
SHA512341287bb4673e5fe7ae2fcbd3c88880c927ab1802932a6f8d4b03ff2d9bfeeb7445ef46105751fd09e2630f025ebd049e70d2455137d8681ee9be325ad53322e
-
Filesize
6KB
MD540123a67b0c7af909dd14c910895f956
SHA1be72c7f2e9826758069ef1ff6c884a22eded5ae5
SHA256b01ded6e419544607008100cefdb1d6c5b30975d35f02767a3002c52f958b0c8
SHA51257e66f1749e2a355208211a8d92b0bb43d7ecb10409195a3e99cde0e1753a547926e70d36533436ecf5aef123f31e7209663a08770c94e35df967a08ff108c05
-
Filesize
11KB
MD5883d0cc22f17fd85ecb1aca4f44f9bf4
SHA109d1c2e0b403c7a57df3cb3c2fa5e8cb8072e070
SHA25621ade9fee37eb8c6c1cc3e6e16d2bee0e87ba6e10da8d87d09b9437bdfb4ffed
SHA512d90f4cedfac482835c4d29cae5ce4d97ee2909f99ff3f1808f2de07c90d0f7f90c7fedb87aa494285cdd5457b929b00b334bee39e6ba0c31c2b1bfb0b3a3148a