Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
29f94783c0ad828aae6afccb03e1014b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29f94783c0ad828aae6afccb03e1014b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29f94783c0ad828aae6afccb03e1014b_JaffaCakes118.html
-
Size
20KB
-
MD5
29f94783c0ad828aae6afccb03e1014b
-
SHA1
e6e50e5dcbc613e7da16bef101bfc46801d996a3
-
SHA256
592264732323ad1f90a9de04916212f81560d3c55104640fbd8268e39d9d39fa
-
SHA512
761fcad87f54ac964ce46fd22779c2f5bcad803ed19584f12fb3d5010900b0bd493f7ded75ffa983183b78b1947dd2f88fb2a2f72a3ced84298e41a30b7559f2
-
SSDEEP
384:SIMd0I5nO9HjGrhGrNGr9GrzGrZGr/GrPGrPGrFGrHGrqGrtGrIGrXsvRGrXJGrJ:SEpGrhGrNGr9GrzGrZGr/GrPGrPGrFGG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 744 msedge.exe 744 msedge.exe 4136 msedge.exe 4136 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 4148 4136 msedge.exe 81 PID 4136 wrote to memory of 4148 4136 msedge.exe 81 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 3280 4136 msedge.exe 82 PID 4136 wrote to memory of 744 4136 msedge.exe 83 PID 4136 wrote to memory of 744 4136 msedge.exe 83 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84 PID 4136 wrote to memory of 4280 4136 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29f94783c0ad828aae6afccb03e1014b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd092d46f8,0x7ffd092d4708,0x7ffd092d47182⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9849170141901246673,8411835023088728286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9849170141901246673,8411835023088728286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9849170141901246673,8411835023088728286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9849170141901246673,8411835023088728286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9849170141901246673,8411835023088728286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9849170141901246673,8411835023088728286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD542d869dd86dc904f31a999dfebe23aa1
SHA19c865cee01c48b159d5559036605d540e6543fd0
SHA25627606766ff1d85296c2e2b73c62cba6217af23ecd6eba943a26ed6bb89c00993
SHA512173e003d20f70a5371b2500148e57d6608747277de759a278c236a0596a49e5b3676f856bfb69df53524e0d50a4bcc2fef92e4179860bf62dc70b62dfa070373
-
Filesize
6KB
MD51af2c6f3fa980962fefe706843640f69
SHA18afea28c11ec4902c7b5ea8da55f56675d3dd809
SHA2566e5f2c58dacfba007ef96f7e52b762d9830254c4c3163ab78a526284302796b9
SHA5126e9f4fe7d0e04a72a3b6fbf634b6011395cc1fd4d69519bc17c54d8c750ac370798d334b63289ac66be0fc21cd4f0a259c288f339569a5c46276a2324ad7a422
-
Filesize
6KB
MD5a24cd190f24914e29c4f1632234a9305
SHA1d4a8ddab16911986a24c201e6d90bb386903fa4d
SHA256f6d8c0f172e8138c64bb7933b5303813b9e434df036fc204e835747bb7150fa9
SHA512025cc581d200e9b864c09292ca463f46a5b08966ace3270bd73c72f74f80d98ee6f2345cc3b58218ff8ad80f4811cf22044f0e8be563294f1355395fe2d898e4
-
Filesize
11KB
MD5888504c64205236aeacf80b575e8fdb2
SHA1c7f1d5d039a9c1cb8322e407c8534da1ec9c7bad
SHA2562d647f5101cebbb53ac32c9caba0678b0b5d4ebf95b873250c64ee5c85603cb8
SHA512cecd3c456922854f7c43c4ed2307a562f551544d3afb1e835c62d063d53a55789e77fb5b47e915ae087851b72866bcb8f38db753696cd942079bdb299ad068ea