Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
379dc3a35915b3657e57d657e9f8b6a5_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
379dc3a35915b3657e57d657e9f8b6a5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
379dc3a35915b3657e57d657e9f8b6a5_JaffaCakes118.html
-
Size
139KB
-
MD5
379dc3a35915b3657e57d657e9f8b6a5
-
SHA1
9764d43be85c2baf2c1820a50cb547ff84f26754
-
SHA256
9d4160a62f4512c48f97fd594471928781730475ebc91dae6a7de9f573c009a1
-
SHA512
1b5450408605ec5c5f58ad889a9fb4a14707247a65207b717755f234b7cfa191c6cd36cff77e7df32977df28059cbb209d091f677161ada7fa36976d95bcda7b
-
SSDEEP
1536:SzNE7F/ZlNxQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:Sz8xQyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3764 msedge.exe 3764 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 3420 3764 msedge.exe 81 PID 3764 wrote to memory of 3420 3764 msedge.exe 81 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 8 3764 msedge.exe 82 PID 3764 wrote to memory of 3588 3764 msedge.exe 83 PID 3764 wrote to memory of 3588 3764 msedge.exe 83 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84 PID 3764 wrote to memory of 3784 3764 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\379dc3a35915b3657e57d657e9f8b6a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fd0746f8,0x7ff8fd074708,0x7ff8fd0747182⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,4983094155341073361,16510580824913605118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,4983094155341073361,16510580824913605118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2788 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,4983094155341073361,16510580824913605118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,4983094155341073361,16510580824913605118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,4983094155341073361,16510580824913605118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,4983094155341073361,16510580824913605118,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD57cacce2aa7fda0aabf7a0968c6462810
SHA11bfac592188a56e2f43999e091cc128dfb1bdec3
SHA256556e5e74b9cae89c6b7d9528502089a77f695583fafaf317dfe86a5bdffdbdd1
SHA51229dd2f020b97982b216c4170454abfe219efade1529b5001878c36254f285315e01c5bab9be99893acd7d3137bb7fa45dea33a9acf1a1e6cc9f5cb1dc6d97143
-
Filesize
6KB
MD56494237ebe056e8a38337dcfcc29dc43
SHA133be40f834edf7f792507ed16d26e54a1bb3cc65
SHA2569a0a89f5a24ef0424d997d0a060b95537647097bba93c59b34b1c347d14fd311
SHA512e3cef3be78f24e7393ec347343736cb85df0fe74c3b6745aa879d17bbd601be9190d05427f5d60fc303ba69bf84e6c11ee33648beb898bca95f71d4ced8c07b5
-
Filesize
11KB
MD57967e90489a59c0e4b92c81ce17db20f
SHA1d8d9cbe92c82207df0eb6ef7d660c048d11b08bc
SHA25682706551790705e510f7d16b924a0f755f67c1a1bd097ac13073dc88fb10b33b
SHA512f2bfceeae629643320b7e81cc82d208fb80bc3c50a259a52188d6fb133ffb0b1179c7f91c9b34a32d4125daba5d20f03de546e4e6d9ab22cc164d0343ebd53a7