Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
346dc42a87bd48c70e0e94417bcfc188_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
346dc42a87bd48c70e0e94417bcfc188_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
346dc42a87bd48c70e0e94417bcfc188_JaffaCakes118.html
-
Size
454KB
-
MD5
346dc42a87bd48c70e0e94417bcfc188
-
SHA1
30c2ecfe52ed9419aa8b8cf10a3f6176b12a32cf
-
SHA256
9c9ea1a0ab27d6b4ab9dbb4764d83f46158f320c239edef691e11cdb7b5d7ba9
-
SHA512
bd0721557326eeaf7eea0d7ed9eb588d51bf904b69f682a089ba802f08a8bf53711a3b49314ff53797026d1871712206f5772db092c446745b16aa3ec08fd7ad
-
SSDEEP
6144:JsMYod+X3oI+YEsMYod+X3oI+YXsMYod+X3oI+YNsMYod+X3oI+YQ:V5d+X3o5d+X3Z5d+X3D5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4528 msedge.exe 4528 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4528 wrote to memory of 1748 4528 msedge.exe 81 PID 4528 wrote to memory of 1748 4528 msedge.exe 81 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4660 4528 msedge.exe 84 PID 4528 wrote to memory of 4256 4528 msedge.exe 85 PID 4528 wrote to memory of 4256 4528 msedge.exe 85 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86 PID 4528 wrote to memory of 1256 4528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\346dc42a87bd48c70e0e94417bcfc188_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ace946f8,0x7ff8ace94708,0x7ff8ace947182⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,983572154630577240,13202122290331396713,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,983572154630577240,13202122290331396713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,983572154630577240,13202122290331396713,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,983572154630577240,13202122290331396713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,983572154630577240,13202122290331396713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,983572154630577240,13202122290331396713,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5f7041e2c5f04728a73731a8c1f82247c
SHA1fd81ee7cf3b7413fe69895803b300fe978a63139
SHA25676635ce27d018b42b370d7557f8535cdef2105507cf9d2e1ee8e43122f62f4e8
SHA512536a5d259dddb7cfe14ab1a6f1de7622af787b1d7caca21716a9f2210db9434bd8a48bb61e325ee113bff5786e2de9c44a5abe870f31f522a1da36ed3aa69cc7
-
Filesize
6KB
MD57596f5c69fe3a52d0662d5337066c7af
SHA1d53247a291242615e58dbd0718e143dbd597537c
SHA2568bc8816b1596712c598edfe9fc0e145987c651f84c67d490a6d3390a4ec8e886
SHA5123079deef5603b40d5b20a2bff2973d750d71137c0051831b041b2b78af7e057c2aeeb267856db709207ebc3e70e2d7298dadf915584f31b95dc828c5a8ca56c8
-
Filesize
11KB
MD51bd5e8834b5f48d0393a44e7952abe0d
SHA14dddef0b2547faa7e96830d4f25756d4014c42c0
SHA25601ae7d8ba423ecb367932cc57feb50bc5be409b302f5bdb242983dee2668ac72
SHA5122ad6114660ec7e792a72a1b81a15eec56c380d427e94f919aac51a3a265e5a8978d798c233df69cc1c9128103a993df487f563a8be33892a2e1ca59d9953afcb