Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
41f2ab3098d55341b5d1e546a7aa74a2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
41f2ab3098d55341b5d1e546a7aa74a2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
41f2ab3098d55341b5d1e546a7aa74a2_JaffaCakes118.html
-
Size
75KB
-
MD5
41f2ab3098d55341b5d1e546a7aa74a2
-
SHA1
10716f92653520780da5c92eadaf54fd3727bae1
-
SHA256
4e07e9f1198653cbc6fa56375cfc3b958e2b3e319181907326b80d990d7267df
-
SHA512
37682c6e3af194e742cf91c0df99fa70be5aac5643ff1342d440d90482a9173cc12113d816e7dc523c579b26470a1b1971039240f6e8b231482709d8f32e066b
-
SSDEEP
1536:xwsGVdsC7Ve7QjIAKsPxyzxMexuzxQFWEnjVSLtEV/ed3FhVzedy7WVKedMvjVlH:3GVds8Ve7QFqzqs7cxVzyna/7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 964 msedge.exe 964 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 964 msedge.exe 964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 1968 964 msedge.exe 81 PID 964 wrote to memory of 1968 964 msedge.exe 81 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 2152 964 msedge.exe 82 PID 964 wrote to memory of 4672 964 msedge.exe 83 PID 964 wrote to memory of 4672 964 msedge.exe 83 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84 PID 964 wrote to memory of 3980 964 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\41f2ab3098d55341b5d1e546a7aa74a2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb884446f8,0x7ffb88444708,0x7ffb884447182⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,15271781534141539374,3763014303141235411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,15271781534141539374,3763014303141235411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,15271781534141539374,3763014303141235411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15271781534141539374,3763014303141235411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15271781534141539374,3763014303141235411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,15271781534141539374,3763014303141235411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
108KB
MD5cf7374e7e4c8fb06863dc0edba52f63e
SHA12a580c5dae6aabd3cc04347e4d3d8419fabd96f8
SHA2568394cab419912b41405da6589f0ffd7f1b866d023977a5ea2b8943cf45e58a0d
SHA512ebe4d8128c8209de53d3627f58aa175ed071edb9093369c211203dd3aaa2a520eba46724314ffd86d19d6cdc0093237ef1b1e1e62b55ae43b19277e373e502ac
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
184B
MD5bd9693967cfd1f70736af0369d972a57
SHA10d12a77858e93306ea70b9f1436aab662d1c2569
SHA2563a00212e4a38aa5746c883c6e9d628552b3df25066148ad79fd4502f27245b13
SHA512cd4d930f52c31bdf185df00421d08ee3e7ce8350b2045976d9f706ab61f00ae07bedc272e37ea8fa81a646dcd3a2bd8d388e41ea82aa2c5ec8473fc99816b306
-
Filesize
6KB
MD53cf8af528bc42f7bab652bcbfe32c195
SHA1d1cdecd1c167de9165770883a14ec60adf599a70
SHA256a48e120db9a8ebba6541b61811d9f614f15ac0ec5a68711dcfdbd1c8e4e8b5cc
SHA5125f2d189e07a2ed75485a24f34f42bb602c0d0e0f492f6cc6995d33c76f657f0b8a84c3b35fd2d95fd1769f1941beec41642cea35bc42627c51eef7577f10bef2
-
Filesize
6KB
MD57c2137ed9dfee555580a6eb2f862dcc4
SHA1944930caad3f3c97737a0aeff2c3e52ada7e4a4a
SHA25613ce3cc1f3483b5e28ba9141c77f9ffcfe370a34501d8307c4bb2f6b7fb2edc9
SHA512c1f0f609475cca2daa2c30212397b8c4a6cf1e6e77503a5b4001195f5b67df3f972e074c32d6174dfa3ea1a06edd8a561ccf56b523b46e72d3d2d57e9f45900b
-
Filesize
11KB
MD5fea0d0e4204f39e2326250c6fe38a2df
SHA1fc912230e11acbaa69163f40bac3c1bfe74f5b85
SHA256ef4c57dc8b42c421febe5d2683593e59efdcd8dd1708f3dad4935e6b4496efae
SHA5126ad715d511997464ceacbc306438310b231aa429496e856be176912a61bf4837a188e386f59ccf7ba1883828d4a5851aff375abe5e74abf63b9213e73273edf9