Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
3a6d4afea2b5c4b067181f1fcfc511c8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a6d4afea2b5c4b067181f1fcfc511c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a6d4afea2b5c4b067181f1fcfc511c8_JaffaCakes118.html
-
Size
18KB
-
MD5
3a6d4afea2b5c4b067181f1fcfc511c8
-
SHA1
70e8994fe87e88dfbee952f1c54a7c5ab4cb0f47
-
SHA256
d085be6006abf0a7f4d886205f47a0d6c6dc8e393c5c3f28a0b96d7f02cf29d0
-
SHA512
09f428b6bc00371b39fd81505000bd517716cbdad564709881912f3048cff795fb6a4f226298aa28d6f425f109c5d60671a74459c80ba9f028f49dca26de7f67
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIy4ozUnjBhE+82qDB8:SIMd0I5nvHPsvEtxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 1176 msedge.exe 1176 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4324 1176 msedge.exe 81 PID 1176 wrote to memory of 4324 1176 msedge.exe 81 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 2156 1176 msedge.exe 82 PID 1176 wrote to memory of 3656 1176 msedge.exe 83 PID 1176 wrote to memory of 3656 1176 msedge.exe 83 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84 PID 1176 wrote to memory of 4924 1176 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a6d4afea2b5c4b067181f1fcfc511c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85d2746f8,0x7ff85d274708,0x7ff85d2747182⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12571007126959770832,5044396038322330287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,12571007126959770832,5044396038322330287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,12571007126959770832,5044396038322330287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12571007126959770832,5044396038322330287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12571007126959770832,5044396038322330287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12571007126959770832,5044396038322330287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD5e8285d5afa92989842fac493cc7e1e44
SHA1714960eb6b4ea9e72e31320224bdd0f1a3a18e3c
SHA2561ac08ab948b6347d85d031785e9f0342e59678317c27a42cfc5528fd0d9ede2c
SHA512be7df523f4106dc1e1ee097fb1b7ff8f7a41e65820b117a7930f770d04f2d8f7846d65be68e821030fb9b95e50999dc8605b51f9a46418ac29541dd2c2aba861
-
Filesize
6KB
MD5b5444ccad7c5a3858957f398d185d320
SHA1381996946e15fc7e5b0a2086123ea2b620b610ff
SHA256af37f381cbef27cdccf752e596320b59809fb6a288ebe032cd70962809aa6fe2
SHA512631220baaceb726c35eca0364caa844d8810b3e35c3f8b3375887f038b8a7ea6a614dd60b090a00a877884469bda09c158bd302b2bd25e044c2650f11adf988c
-
Filesize
6KB
MD520f298023098ace78b7ce359a8591768
SHA1f7aec6b829b30dd0ea3cbda3fec6bee2bf0499bb
SHA256e79646f6ad7fa7fd0960248c0c709297849bf62bdd1e23685b34beafd0c44d9a
SHA5122e95f456eaef56a50d87a21d5e875a1d18659b5f3c4a8fb627f50c373dcb93a96e5ca1a155acc5f186409887a78896255c625d58f2d294e4422980857f40ceef
-
Filesize
11KB
MD59706eb520fb44eb51133659d8fc9aa58
SHA1809e8e1020e1f51cfa011c205e00332fce617a18
SHA256062c935d1faad1b7cfc77f206b1414f141a803e5b59e6908d0ae6aa990a341e7
SHA512f1021766e593c341677bd785d090d53d5ff373e5d3a6b8f76419dad3beeac24a62481678e2e77ef3f927d3e4fac6f9164a43c57c7cfe0b772bc61db4ee6dd537