Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
369d779b81a433d95cc12463b9c62ab2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
369d779b81a433d95cc12463b9c62ab2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
369d779b81a433d95cc12463b9c62ab2_JaffaCakes118.html
-
Size
55KB
-
MD5
369d779b81a433d95cc12463b9c62ab2
-
SHA1
41a80a1b0ca2d47d223795f1f0845642264fb118
-
SHA256
04ea92cff05c20fdba1be038db2ec40b97573a5ca1e90ea863b9708f496bd0d4
-
SHA512
1239b5fdb4872b3f87eb1dfdcc05684ca4c4c390d9e57bc0e58c52b5f06740fe21c7493bba869422992c930856de063171889d0657defee3190509d791476ed7
-
SSDEEP
1536:yJW5YWKa2QZmTWuA1S3xThkSRJ4+6XVqn5XTL:yJW5YWKdQZmquA1S3xThkSRJ4+6X4n5f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 3800 msedge.exe 3800 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3800 wrote to memory of 2480 3800 msedge.exe 83 PID 3800 wrote to memory of 2480 3800 msedge.exe 83 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 4516 3800 msedge.exe 84 PID 3800 wrote to memory of 1492 3800 msedge.exe 85 PID 3800 wrote to memory of 1492 3800 msedge.exe 85 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86 PID 3800 wrote to memory of 456 3800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\369d779b81a433d95cc12463b9c62ab2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e6746f8,0x7ffd7e674708,0x7ffd7e6747182⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8657266533584675796,17137786071588007643,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,8657266533584675796,17137786071588007643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,8657266533584675796,17137786071588007643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8657266533584675796,17137786071588007643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8657266533584675796,17137786071588007643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8657266533584675796,17137786071588007643,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5f8b7585b081a01c5111119d14e07b549
SHA19d7b9ebcbddc2524b00ae3376040871e69003734
SHA256a16bb63f1b211bbc2924c9dd5404b3c91cd2ccbafd25964020e605076cfb17be
SHA512e51100b64329dc8917500112a2588381e884513a09855cbac9d5310bdcfd7ddb1e8a7c0bd0a7d4c30ab797f9c5e924290a5fd0c38e5bf7dfb7dc73c43834948a
-
Filesize
6KB
MD5c561087ae918bd5e87f00fa2688819f5
SHA1e86744e853fc7c4a37371368da8e64e42f70bd45
SHA256e262b51f6067d7a641c78f74b877e0d1a7ed83af281db6d805d735ba280083de
SHA512c1cd9a9eb77364a3cf43f66bdf000e644463ce49392383765d3981dd5a864c6193ee3ef13ff35a4f215b9de6ffc14a6fcf0b3f7771acbf00c8163eea3bcbad96
-
Filesize
6KB
MD5efae516f09eab573b287c27729ee718d
SHA14bad3078db9be72766920da6683b00e1af1bbe47
SHA256dfaa3588e21ecfe36317b1b239c1d19ef922ad894416bb7361794ac5df4ec852
SHA5124f650704a5fe03dda5b75fcb3b19cd1683fd7b1828b20096688a94eba39e14201e2a3feea198a35764262f82c08ed6f23105a4d06be4fac00941dbd3b7dbd2e6
-
Filesize
11KB
MD530947fd43576ae1bf053bdfdd8eed771
SHA1c31358ab95cbda9a1469aaa6ae1432efc0be742e
SHA256ee4daaf2dd4e1d6edc444f57baaa648c2e669fd9b621326e4302d6d4a1067d2e
SHA512480fd06532ad939cbee6610c63ca055bab194b21bdb2163450a4fe6f4ef973aff0665d8d12c00f93e28e1a77152c65001499d4a48ef44e031cdd18083730dfa5