Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
35f4ee1a3b98cabda16b6c5f57ffcbfe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
35f4ee1a3b98cabda16b6c5f57ffcbfe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
35f4ee1a3b98cabda16b6c5f57ffcbfe_JaffaCakes118.html
-
Size
19KB
-
MD5
35f4ee1a3b98cabda16b6c5f57ffcbfe
-
SHA1
32a215094a0f472f16a2002e05c8589d530a12f2
-
SHA256
8f120a666428ff7299572c1ab93c323d2b831a34b8ed10ff142e1ae8dffd477b
-
SHA512
649f80cdcb15c7e575689a869518d8ae37d47ed0ca052582c5583a06729aa063985e102d4eabc88fa98523b0cf13914eb052a87839336217aa493fe60065a166
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI54pzUnjBhHJ82qDB8:SIMd0I5nvHxsvHixDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 3288 msedge.exe 3288 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3288 wrote to memory of 3240 3288 msedge.exe 83 PID 3288 wrote to memory of 3240 3288 msedge.exe 83 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 4004 3288 msedge.exe 84 PID 3288 wrote to memory of 1012 3288 msedge.exe 85 PID 3288 wrote to memory of 1012 3288 msedge.exe 85 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86 PID 3288 wrote to memory of 4980 3288 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\35f4ee1a3b98cabda16b6c5f57ffcbfe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d3746f8,0x7ff84d374708,0x7ff84d3747182⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4363872090835421437,16889580571773025809,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,4363872090835421437,16889580571773025809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,4363872090835421437,16889580571773025809,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4363872090835421437,16889580571773025809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4363872090835421437,16889580571773025809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4363872090835421437,16889580571773025809,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4564 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5658dae78fa2a2efb1e64f90e0dec69ec
SHA1c7cf93107cc17db514bfc7eef8baf0df8fec4e2e
SHA2562aea023ebbdef2423763e58eba711f09db7ef98a557686380ac779f021c2c19a
SHA5128c81f712e8c2d293e50f67a1203774a758df50a92dc0ef1f0f28438962c09aa821ea25173d54c3729f4d7678edf37571151218357342ab222b596153550e8727
-
Filesize
6KB
MD5871d62c0b02d45ff6845c4395f0df849
SHA1c08bdc7602bcfe0d07df76144cd3c391ccc31525
SHA2561d538e5e7a9df68a15c7ffc1eeb0ffa8392ccd490389f26dd4246f1c06251ebd
SHA51209b238e8ff6d15205e41d6c32fe9d7cdf74de76d4992d0de16bfcbbc43183baabeeebf4dcacbba73aa9a933536958e9355af28be8db188b86c96597503ab2d9b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a07a05c4-10e6-4c83-a052-6128207b28a3.tmp
Filesize6KB
MD50ad799ae8f5484de3236e55583a8163c
SHA1ccd46a4693fba712471c710a081abeb79719eb3a
SHA2560b169d43754e841ea10456400c2ea28b25b4af036d676cd10fcf94e6a22e2a02
SHA512e97b17374558919ec0a6e3b59dd1636ffc7209c39e76c473b3ec8ff42bd944f69944f93f0aac1972a168de5de783f13a38b996cb4dd2632e522fb3c54955f7e8
-
Filesize
11KB
MD556e7c6a98fcb65ecfa20b9e0fdea8b21
SHA1ae6ff52fac2766244d4009c0f365f56c369fc248
SHA25645ab9624a4007d117b653d79a6926f94b075442f0f278794ea30f2cda59b0f67
SHA51241c1128c4d6843d37e57c50785bf68c5412af8be825af9e295352d5bd35bdb90ca9711bd18cc1aa4dea89c5d0ab3e8a955d8832617fb5aee68d790440775da17