Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
396064ba7e4da35d9b510944dc6fbbf2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
396064ba7e4da35d9b510944dc6fbbf2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
396064ba7e4da35d9b510944dc6fbbf2_JaffaCakes118.html
-
Size
18KB
-
MD5
396064ba7e4da35d9b510944dc6fbbf2
-
SHA1
6a00c0481b66a848bd2bf89f4515c8e788355df9
-
SHA256
901ce4fb265caa284bc7b785a8afbe87ae18a858a59178719910635ccfa21fcc
-
SHA512
0a897670cadacbe485ee6e601e6d6b2c7d4c02a15b4725818acdb9d4a427479cc77aed2f798134d033c5b4402692102953045a23833f5e0a3ccc51e837841ae9
-
SSDEEP
384:SIMd0I5nvH6+qa4uwgoCErKhFsv8JUwxDB8:SEB+qa4uwgoCErKhFnWwA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 2860 msedge.exe 2860 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1884 2860 msedge.exe 82 PID 2860 wrote to memory of 1884 2860 msedge.exe 82 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 3240 2860 msedge.exe 84 PID 2860 wrote to memory of 1940 2860 msedge.exe 85 PID 2860 wrote to memory of 1940 2860 msedge.exe 85 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86 PID 2860 wrote to memory of 3016 2860 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\396064ba7e4da35d9b510944dc6fbbf2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9278146f8,0x7ff927814708,0x7ff9278147182⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4507594158925702567,10723323618503567805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,4507594158925702567,10723323618503567805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,4507594158925702567,10723323618503567805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4507594158925702567,10723323618503567805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4507594158925702567,10723323618503567805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4507594158925702567,10723323618503567805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD5691342980f3d32cf2f5869784462195b
SHA13cc156c93900bbada3c89b64aa78e1377944363c
SHA256699bc7c7353fbd8b257905e59940200c8e33b26960aeaa2c4b6d48cff6a4e06a
SHA51204857503d0bdc76906d219c539e0e0111cad2a58e4d1422da79117e6a0c9758c7789e1a3de6f4a3e93d57a932de73df8be918ed4f6def19861183422b8f658d3
-
Filesize
6KB
MD5d9cd47106852472c9ad42eac30c552e1
SHA14fd01449111e1e8f43d08e14ee819c1f9f6945e7
SHA2567f96391f75da9f5aa718940e9844474a83cb03a439dd13e2a897b34a102d75c6
SHA512c452e68e51663f855b9657a6cf647647d380d4f5f0b0c5ed3aaf8cb87d4376935e259bb78a60695c6f18c03565ae730e462288158e39044f8ddce9e4cfe242ed
-
Filesize
6KB
MD5d464667909739134c0edde96519fc682
SHA1a05b80f4fd407017cfefb7f78ace45239b9eba47
SHA256b07f6dfe25e6c0d44886425131c075f576d93adf63537b6d1ce26719464ccfcc
SHA5129b0dc975d8b1628302513b7d45a088a435e08d9d760f99a1b167a228ff3c7188fa0653cb2c40f32aebbd70e08d0223e0bcd3bf243b405f10d443a56ef94c9e8a
-
Filesize
11KB
MD5a39d8fb7913d5183fd4780e1ba314220
SHA1448af0625d3fc22a37090e047122b5a64e132b55
SHA2561ac3ae9a0782f09a8280bf1d00841223104340e39b61ebe61cfc49c294abbd57
SHA512d2e8d721de1a43356dc24c19e57810438f07c4f0f676a9b9f2a7fb90a573dcd4386c8cd87ddf5484641d81ba15331bab56178043b257adcf1b673eaf71db49a6