Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
2e6d9686b0c560e3a3145708cba0b327_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e6d9686b0c560e3a3145708cba0b327_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2e6d9686b0c560e3a3145708cba0b327_JaffaCakes118.html
-
Size
139KB
-
MD5
2e6d9686b0c560e3a3145708cba0b327
-
SHA1
59aec6f2523e63a14a558a0e5b541848cd8aa8c8
-
SHA256
5d180a68d6ec2e974479dc90fc6e3fa1d1298f9ead4fcdd72d0a245c3e61dfde
-
SHA512
137796ba7a98feb1cf34f55b733a1ce0e453f517e55d23e21f7187b27454ee5cd3b8f41d225e73f92e150f1c0ed155fb9ac827e7354976257c354b406492c357
-
SSDEEP
1536:S+vqb8dyAlSyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:S+FyTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 944 msedge.exe 944 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 944 msedge.exe 944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 4884 944 msedge.exe 82 PID 944 wrote to memory of 4884 944 msedge.exe 82 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 3668 944 msedge.exe 84 PID 944 wrote to memory of 1588 944 msedge.exe 85 PID 944 wrote to memory of 1588 944 msedge.exe 85 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86 PID 944 wrote to memory of 4844 944 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e6d9686b0c560e3a3145708cba0b327_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe841046f8,0x7ffe84104708,0x7ffe841047182⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1605552365825019879,15916931651114469784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1605552365825019879,15916931651114469784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1605552365825019879,15916931651114469784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1605552365825019879,15916931651114469784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1605552365825019879,15916931651114469784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1605552365825019879,15916931651114469784,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD503b2ef43fa888f37e77fb8b7843b7f2c
SHA1a94122913209452a7462b98b496560a811e9cd29
SHA25677b0c2803eca784eaa04c23f020db060a2495fcad7c19fdbaaa8f16e575358c2
SHA51285200c986f93949f4f007e1e12b132d0fcbce9dc46f713460c99ab2f6a82f8181dc824244a5eec4c00848d45c7de36c2b4bbdfabb927e803a2d25b1facbce46f
-
Filesize
6KB
MD551a0468d68568888c61ecf1570b65848
SHA14f3ce8abd576698f9093de5f77baaf3bf5f6458c
SHA256b0470601bc9da0e4fa39c932d962864647ce31a1261b2a233e3c8da1ec803e26
SHA512024da4633bfcd4b5f538c6a52be82c3276ec9735b7c09e518ff2a3985046824adfe5defec0f5ecb256faa052a164c2b0fc5fc4f92be03be275abc9591517cf5a
-
Filesize
11KB
MD55c5d63e139446b83cbed3c0cc4c97500
SHA10ef062be7c7276d902d754fa54f286af9370b1ab
SHA256b940f6c6815fdf45afcd7cf28eff6a2ad06a42b87526806aa1e24d8b7189182f
SHA5122381a9e2f9042f2f99d7f3590b9c6a273fb33bf215cb86c44be42c06b620d4ff5187673ec56745855843b59a5e3604a0eb5129ee6c6aa19a080a38aa3a96d2e2