Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
3d08e34b30032ec6f1991fe564c80b5a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d08e34b30032ec6f1991fe564c80b5a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d08e34b30032ec6f1991fe564c80b5a_JaffaCakes118.html
-
Size
22KB
-
MD5
3d08e34b30032ec6f1991fe564c80b5a
-
SHA1
951b227f608ba2b8020b5279906bf4a3f34c091c
-
SHA256
cbb751bfe3dabe7023e8237caff089bb6c09449b21ae4779b241f66dd9a59033
-
SHA512
f94bba03acee955efa1367dd0accbce4d11ae68798e92e86a477408b526c2bcfbb5068369cc22f0c3eb4391c0b610bc873c57b2173e769e26cc06930c988d1ed
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIG4ezUnjBhGY82qDB8:SIMd0I5nvH1svGrxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 2716 msedge.exe 2716 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1388 2716 msedge.exe 82 PID 2716 wrote to memory of 1388 2716 msedge.exe 82 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1372 2716 msedge.exe 83 PID 2716 wrote to memory of 1020 2716 msedge.exe 84 PID 2716 wrote to memory of 1020 2716 msedge.exe 84 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85 PID 2716 wrote to memory of 1016 2716 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d08e34b30032ec6f1991fe564c80b5a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7fff1fe446f8,0x7fff1fe44708,0x7fff1fe447182⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,18212142800767483520,16777446105113093956,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,18212142800767483520,16777446105113093956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,18212142800767483520,16777446105113093956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18212142800767483520,16777446105113093956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18212142800767483520,16777446105113093956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,18212142800767483520,16777446105113093956,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD591173a4cfd46ef7108eeb730812aebca
SHA148dc78c0387b5cde51531844e39526313f8102b4
SHA256552b7f47532b1552c4be151930bf4418fa411189d247acdc26089bc399d24a11
SHA51297ae58d7b221234ca5c2755ce621856bc127eb4458e448ab3d64ec6491dc534eccdfc50c51e96ddc1378f1e70a13d6bb75456afc3819d6ce3baa0caf60a5e638
-
Filesize
6KB
MD5dc1c70740bd023f8a78b5f76e6139f2c
SHA13af545bc21242f0904b68c458bdd28d5433108af
SHA256529bf94ade55fad1969f47badf425d1e0524059fa9f5bc406d6683743e0aeb0e
SHA512b32914a288312b9c014073f5959d0e4e953da40404544985e15c11be29dd4af1a6cf84368e5e614aa390cd2391b580186063f79d02c890a346923a364c1b635a
-
Filesize
6KB
MD538d0452fa505289b22a7542ce30bcccc
SHA113f6ae2a52aa36d763e1916581d1961dbfa4f47c
SHA25698d78c97a9971f5555e2fcf6be826624c0d0f4fcaa9041562129c318456e5e15
SHA512d3759f8b3ad812a27bdb0422f190d2f59f0c33a8f59ba9b1bffde1641e1e331983bda29301070632a5354bc918e1e6d0aa0477f20f970c336c4e4f1a358c8b0c
-
Filesize
11KB
MD5d28c1660ce198505b9e13554c635a0b6
SHA1b81fe34da900fc16bb7da6fa6c8e6ca1c4cb8422
SHA256113dce927d6997d535a76951d437c9faefddb29c795616e7acea4be906ac69ba
SHA5122b16e73871c8313905e56fdd97239fd1fbdd5cc91eee83eab4168a6953fe7a6642f00ac1c327fd5592eb078dc3713b3ca348b4d31e2887f72d681f2f44160d77