Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
365fb01a162d937fe19393ade62d1a18_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
365fb01a162d937fe19393ade62d1a18_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
365fb01a162d937fe19393ade62d1a18_JaffaCakes118.html
-
Size
141KB
-
MD5
365fb01a162d937fe19393ade62d1a18
-
SHA1
b1c063499a61e5e732c4091232d28b8e815b3923
-
SHA256
470024d1f12066e2288afb2e306c7d6fb1fd08034be7460ce4c106fdfbaee90e
-
SHA512
183290b25e27076abad6a2163ac3c1719a9a22367874718aa242729d02cdd7cdac0df53757dfd81f7d2733b9ac748604f7882fe6dfe5d4fff04c95041bb5754d
-
SSDEEP
3072:S1GHE2kvAx7dyfkMY+BES09JXAnyrZalI+YQ:S1GHE2kvAx7osMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 1852 msedge.exe 1852 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 5032 1852 msedge.exe 83 PID 1852 wrote to memory of 5032 1852 msedge.exe 83 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 4700 1852 msedge.exe 84 PID 1852 wrote to memory of 2744 1852 msedge.exe 85 PID 1852 wrote to memory of 2744 1852 msedge.exe 85 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86 PID 1852 wrote to memory of 4576 1852 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\365fb01a162d937fe19393ade62d1a18_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafda846f8,0x7ffafda84708,0x7ffafda847182⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17306717321845157457,2505087032219230212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17306717321845157457,2505087032219230212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17306717321845157457,2505087032219230212,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17306717321845157457,2505087032219230212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17306717321845157457,2505087032219230212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17306717321845157457,2505087032219230212,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5e94e2f69806ffbf7f4f3b5f66a1ee1ff
SHA1b71d80ddba0fc714b1444aa0e7e448c64d1fdf5f
SHA2561f8a03b6fb9651e4dca806a5887e002226970cc0e3ed7c8d912a91e5eeccc314
SHA512e1f66c0403951fd06c0ca2f7489f9b9adb7c9fef6cae86b5650567610b75a5b4d9dd915a9f371035c7f3206cda6758cd0b81f0e56bba3412aa4552ddc4d8d785
-
Filesize
6KB
MD52bc6d4db61ca47108df99f42859e204c
SHA152178e24ceceeb6ec489b1a9315f92beacc58ef7
SHA2563f5eb398fb62b99043c173fb19c4df91ef996dac7faf91ab3f0f94993b31c645
SHA512565af9af2e7ab536b4e6c6506c01b002238af490c265eeb8c3a3009892908dcd675833c471ee5f6c6402a2779375469b14669f1483f6ae5c9ff91d2a3cccfe5d
-
Filesize
11KB
MD53de7f928470257506d9e038d3936a883
SHA105769c9192d8a5a73215d6462ab82df13d330683
SHA25637aaf0aa5c0139231236bdb49826044494616d32a3f5ef33883f16c0e3bc6236
SHA512b22d7d5e66e0a37e1780979c487fa222e97e2396407243bf953d0860bddd33bfa9e5db24fd3caa1690d79bd5c2cbd2620358eac3f06cfbb0a5a9a49720d2b757