Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
3a673758be85d861af379edb0331bafe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a673758be85d861af379edb0331bafe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3a673758be85d861af379edb0331bafe_JaffaCakes118.html
-
Size
140KB
-
MD5
3a673758be85d861af379edb0331bafe
-
SHA1
017131c31f007d4b4648cefc4f046b88106da687
-
SHA256
5a3fb61be4c31170612ebabdf6e78cc71aa2c75ed25f547574e296191f374b55
-
SHA512
56c6f32445b7a96ed11aeea489780549e88df3e42476ec5094e1f8fceae3045b8f7fa36ed8991bbddfae5f26604d0a969b1b457cb1497ebea11add09e5881839
-
SSDEEP
1536:SJTOnFlhcCyyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SJIcCyyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 4488 msedge.exe 4488 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 1572 4488 msedge.exe 84 PID 4488 wrote to memory of 1572 4488 msedge.exe 84 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 3424 4488 msedge.exe 85 PID 4488 wrote to memory of 1868 4488 msedge.exe 86 PID 4488 wrote to memory of 1868 4488 msedge.exe 86 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87 PID 4488 wrote to memory of 5088 4488 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a673758be85d861af379edb0331bafe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe48be46f8,0x7ffe48be4708,0x7ffe48be47182⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,18174862209077468012,14179783874413047240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,18174862209077468012,14179783874413047240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,18174862209077468012,14179783874413047240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18174862209077468012,14179783874413047240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18174862209077468012,14179783874413047240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,18174862209077468012,14179783874413047240,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5f3fe9361fa20c65f551d5786de3ce9b1
SHA149465078fec906c0cebeffabc25ecd2601843e7e
SHA2560712aa49c77d6158c599527050d45f32c18b87c8de002e26e8c28fdd796cfbfd
SHA5129828110b4cfed8ba3c89cb871e07ce9c277e5e37fbd06ddc25aa6a20cb74e23c095a8a21a065e169504b20770d2ba0900685b2a8985b73d5eeb106678279327f
-
Filesize
5KB
MD50c411f7a0fa7a63cdce3698f8c4021db
SHA13617b3ade078a6e15118fc669c4674c00ed8db29
SHA2563392fa8dfc9100d9ec67edfcdb0066d91765ad6c9bb9208eb12cc97e53babe92
SHA51218af8f2dd8e951f36ba40fbae7791669d54cfe1371d296bbe596ed2af7483099341e0b0a2ef68534f6fb1563a9a8e8be5569ef86748c22e0b63f6e413936700f
-
Filesize
11KB
MD55d3c680399c0f6a0b7437071e1a64296
SHA114689cee126cddc8a92ffb76b2927fa85f84627c
SHA256a92517cb6d9d95733ab5d9a83abd02bbb4967882a98c3e04e48aed6cdd926e54
SHA512fd4cbc1548bbe0f0dc8bd4181fdf864cc96c91f805d5ba30206287be0ca61711d848803236af3fcb8a90aab728520e7de2d47fa7145ac644b0ad6d9b98f42d73