Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 07:25
Static task
static1
Behavioral task
behavioral1
Sample
40ad04ea67a052e2ba0a07b0071668ca_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
40ad04ea67a052e2ba0a07b0071668ca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40ad04ea67a052e2ba0a07b0071668ca_JaffaCakes118.html
-
Size
925KB
-
MD5
40ad04ea67a052e2ba0a07b0071668ca
-
SHA1
267c79a3e70a4382cf422c442899e057b2313282
-
SHA256
06e971bd32746b7a9f71018a7d00b3fac223a35a0a3e65a581fa432b3996d78a
-
SHA512
750bd3cfa91b8f4b7bac0f88d39b66c084f861f67e9ea8324586b1a166fb82ca7e8ba8fe2b8a3827a8d5000fdcfd55959bd2e79eb0fcf252613faeb072a4c1a7
-
SSDEEP
6144:jaaSCK04u2sSyjM6hjobOzKVJColFQQqwS22L6DkIbYKb/BqoUe:eaSCK04u2GhjobOzKVwolFvqwS246A0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3320 msedge.exe 3320 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 2148 3320 msedge.exe 81 PID 3320 wrote to memory of 2148 3320 msedge.exe 81 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 1652 3320 msedge.exe 82 PID 3320 wrote to memory of 3928 3320 msedge.exe 83 PID 3320 wrote to memory of 3928 3320 msedge.exe 83 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84 PID 3320 wrote to memory of 4224 3320 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40ad04ea67a052e2ba0a07b0071668ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff089646f8,0x7fff08964708,0x7fff089647182⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10070724822575161184,10038668851328009190,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10070724822575161184,10038668851328009190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10070724822575161184,10038668851328009190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10070724822575161184,10038668851328009190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10070724822575161184,10038668851328009190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10070724822575161184,10038668851328009190,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
654B
MD5325a76d9a4c549f8480de4fecc0bf4e8
SHA15ce1d978acd37066228adffbc983424f53b09276
SHA256948c08641171abe3025fb170868613ec72b95c5d7d4a829d7c451b98ac753109
SHA512a59446b04cfd49045c6df7a076500e7b52d5c22f53f7ff063466a47a4fad4459921fd2464720b5c60b2f509bc89991336c3685b5122121efc8be8b7ca63713e8
-
Filesize
685B
MD576c3f779cbb4feaf8db422595aafd5cf
SHA183bdfbf69009ae395a7c33f5f305ae5df45a798c
SHA256bb9bab3774ac87783667750e913ce58207f6650d293ef795d20cd18d48bea58b
SHA512cd4535daff6d6c1928ba03e28450ca5fbabae566ffae6d50c83b38d418a8f421229b02abd1aed512141a96089ab65d9e93cdcb729f5f8ad305ea760c6f6e7120
-
Filesize
6KB
MD57c7c3819872f0e19300189e7a1ea822d
SHA1bf24863afee364a74964ea89800286e159c80c35
SHA256320806c35b47dda98ce7043f1972c54571bb8abdb76a4133c0722a6a4d073dbf
SHA5128d1c979f0f105a370ae7787912c6b622814128114da71f9a69dd289b3c12a2129e8bd52e437aa7f90c57f5a710860ce7a1f19b3ae97b50b3b31bf5676be628be
-
Filesize
6KB
MD5c452be6ce443b735fe08c4bcc53bfcae
SHA1ae1aa0e1af1f6a13c019cfbce9d725773b4b6653
SHA2568385e7c24f9f9e6704c8298c9fd67a9521c45d9a99e3033bcfdaf8b5126d7c5c
SHA5124a11365a440d734044923a25534bb00cdbd239041b412c09c168be1bd457cf87c0dc23696f197e7730b9ec2cae6882992e70163bcb0390e845a9c9bf2bda2109
-
Filesize
6KB
MD533fee58d5cc74a1b2a6e104fc37e69cc
SHA1a7ad57089a394257e04b65a6fe81f0b78494c5e8
SHA256f1fd91686dbe553fdc36644dd580d36fff7d90acb64df0cfc8bdd4c26d5e441d
SHA5121037675fbf9eabd9a6e35afbf0f16e65b5de3ab3a5c0654309f764860ba4f75a063e5f5040b23023dbc42e1cdc7c1b8863941e06bfb029d63d4ab96b219c9717
-
Filesize
11KB
MD5ba2591ae67b2fb49746912f1980e739b
SHA16b2ebbcae2412236dbb9e25692def641ff936db7
SHA2561e9d5a3297f3a5bcc3875386b31c501d280ce26b9f65d5326752080c6502dd6f
SHA512106d057531ea22b4c2de50502d802832fb1447ffc7b3f8e1f21149e3218efbaceb7fd730d0623e53d03971e957aeadda8d1109cc22bc99392bec17cd19322769