Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
2a644f1eace3cedb9e2511ebc0ea44e6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a644f1eace3cedb9e2511ebc0ea44e6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a644f1eace3cedb9e2511ebc0ea44e6_JaffaCakes118.html
-
Size
139KB
-
MD5
2a644f1eace3cedb9e2511ebc0ea44e6
-
SHA1
b83ab17f333a4a98f2007a19e364be140bb8360a
-
SHA256
58f0d93b521a3dee518c4481148204a742dcfe306ce6edcd4cc59e9260796e03
-
SHA512
2386536f1ab777b39a141a2ac9875c3294e73f43e152fcc6d920d493c20b8bbcd6dc0420dfcb9f8766d107ec00e8fcd27739303f66ea4349a4ff46d262f2b130
-
SSDEEP
1536:SBbCJcel5ayLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SBVyayfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 2948 msedge.exe 2948 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3400 2948 msedge.exe 82 PID 2948 wrote to memory of 3400 2948 msedge.exe 82 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 3088 2948 msedge.exe 84 PID 2948 wrote to memory of 5036 2948 msedge.exe 85 PID 2948 wrote to memory of 5036 2948 msedge.exe 85 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86 PID 2948 wrote to memory of 668 2948 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a644f1eace3cedb9e2511ebc0ea44e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7054246521342547267,4291547627218700937,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7054246521342547267,4291547627218700937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7054246521342547267,4291547627218700937,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7054246521342547267,4291547627218700937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7054246521342547267,4291547627218700937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7054246521342547267,4291547627218700937,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5f61b6e65c5e5eb2a3ec2cf2e63b9b823
SHA1cd755051b4838c302788eb47487e0c42ef3d3380
SHA2567206671523469e8fcff3db5271f93fe2e10b28f5bcc6189ce8dbc68a9819a759
SHA5123b2b7412d6a3856d66a0ad97524e0d885582a653f442ea217d185234865a5b1e1a1a622878a75bf56ca6af114f4bea909f157edfb1cc23ad5c608037f1fe541e
-
Filesize
6KB
MD52fef0f16e76459a5e19424dfc3da67fb
SHA15cbbde7699d2004dbb9cabb3fe3188de7fa3fd2a
SHA25602eaba5214a67e9aa1b082549d91ec5e4ad664d16678b0aff467768de1bc02b0
SHA512623e45e2a27a4869adc4657c32bd84ba524d33f1518e987cae71b11b7da9e9d62eb3bf245978bea54ade9408c0e80dcdcdf72d6cbe7ea41964a099faf5790750
-
Filesize
11KB
MD5855e020b3494e0189afdb4303aa16803
SHA10ea91aee61fc51f03aec679f6abc3024816cf9a9
SHA256014445e8e821d21c9ace1fac49294a82bdfa933d913fb6208d747451be053d8e
SHA51265f4d041b7ccaeafe90d4bdf68d90aea82f03d5c5e18e22ef66290358738ae3ad031ec39e07bbd5aaef385ea41e1a6795c592914c4726369cadf06433155cf0c