Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
2a1117905766e0759807759ffd3386c9_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2a1117905766e0759807759ffd3386c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a1117905766e0759807759ffd3386c9_JaffaCakes118.html
-
Size
218KB
-
MD5
2a1117905766e0759807759ffd3386c9
-
SHA1
46e92e7d958ef0243fc1daae7fbbf4b6629f3145
-
SHA256
ac64238880fb044c1e937c4d5376782d19575aca1c7dcd0b5d984885a30cdc68
-
SHA512
e54049f8237498fbf71d295ef0509ab3746d7f1637a59183c394d39c30ed73988d98e80cf14e78b1f40195051c4faac4f6b244253719101bf2ee9bb8ff8b98d9
-
SSDEEP
3072:SfHBWmXoRvPzyfkMY+BES09JXAnyrZalI+YQ:SfH/otWsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 4612 msedge.exe 4612 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 1684 4612 msedge.exe 81 PID 4612 wrote to memory of 1684 4612 msedge.exe 81 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 3760 4612 msedge.exe 83 PID 4612 wrote to memory of 5068 4612 msedge.exe 84 PID 4612 wrote to memory of 5068 4612 msedge.exe 84 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85 PID 4612 wrote to memory of 4920 4612 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a1117905766e0759807759ffd3386c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea72446f8,0x7ffea7244708,0x7ffea72447182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16814504712379639728,5046489557030804295,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16814504712379639728,5046489557030804295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16814504712379639728,5046489557030804295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16814504712379639728,5046489557030804295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16814504712379639728,5046489557030804295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16814504712379639728,5046489557030804295,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5cda07db8380ae1bc4ffbebbc2c7b38f7
SHA1d15d769112919a1c08bc9677bff963c0c92af819
SHA2561d6e79e8446959c0b4ee5df4faba5c45f29e25dfbda1ddf1355c1e33f3bbe34d
SHA512133eca39ae89b2d0d829ed4527182fbadac054b6dca4216c3c5cdd1a3721fb280b79ab47464e5c122320c3782ec7bae8d88a0d99f58d388d7db7c5c6e581f01d
-
Filesize
6KB
MD54195f48e1f0c7aa195d726b700bf4c6d
SHA11e570d21581adcad8f2ece7291a2566fa0e3fc25
SHA25675ea3eb62a43de863fe6c90e7e35aedcbc666d8db73d52b86325cc44245e5514
SHA512c8dc396d92d9683fc3a67364e11fd01a1a1fe9aa157c73f9bd3d701ed23056c5e871a6209c5feecd7329cd5b131ee3498da6fbd96c62ef20d4bb73e55c891915
-
Filesize
11KB
MD57786d6dee39c33c21892ba0a43fbb138
SHA110cbc641877f917f7388a4baff67744f25d33c62
SHA256a56f87989c6b2a3469cd1c68903f3eeb4e611a169bb945c896dfb21fbfb1c4bc
SHA51257a94aed72aee454607d421b5b4518ad73ab886d227704b90b20469b95e908e76170f9540ad0ecb923dc2b764e4500328422f077815d2d4f354fee4257a543d1