Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
440eb3aaf02a9cab9de67565ddb0e4d0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
440eb3aaf02a9cab9de67565ddb0e4d0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
440eb3aaf02a9cab9de67565ddb0e4d0_JaffaCakes118.html
-
Size
142KB
-
MD5
440eb3aaf02a9cab9de67565ddb0e4d0
-
SHA1
64fbf3593144519bc0f43a5c02bc5378616b7dbd
-
SHA256
c7b9706d3f7a7dc20e2d5bf09000fa4a1d93469ac850815a074153d59b7ceef9
-
SHA512
9a37c216cdfeee55fb86729a6b5bdb742ffeab4165eee5e37bd82b428be621f9e4dfbe48087fff6294ee9fddd3ba2a27e0239baacedc5b4d1b74c49c0fbd4b9b
-
SSDEEP
1536:SSX0wXCnXw4uXx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:Ss2kx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 3604 msedge.exe 3604 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 116 3604 msedge.exe 83 PID 3604 wrote to memory of 116 3604 msedge.exe 83 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 2856 3604 msedge.exe 84 PID 3604 wrote to memory of 4700 3604 msedge.exe 85 PID 3604 wrote to memory of 4700 3604 msedge.exe 85 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86 PID 3604 wrote to memory of 4772 3604 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\440eb3aaf02a9cab9de67565ddb0e4d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8517946f8,0x7ff851794708,0x7ff8517947182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3901822766828712561,14245012140245676895,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,3901822766828712561,14245012140245676895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,3901822766828712561,14245012140245676895,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3901822766828712561,14245012140245676895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3901822766828712561,14245012140245676895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3901822766828712561,14245012140245676895,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5040388e0fbf5f3cbc2d3fa26fc58b4b3
SHA19337a57d5f745617943166132f158dd8417a0444
SHA256784cee756c057ed6e8c8fe63fc637f416c8d4338b7639219af9f8ce20b7c0cc5
SHA5120b1e232446df29092e8769e1fa248fafb2a260ee4baf1b9e3435ff6fe044f4381c826a4e19fc59a16654e41b53c72db9f019ad9abd566a0648d397fb00abc248
-
Filesize
6KB
MD52aa5b7aad7476eebf8cd07434e8fce52
SHA1c72a35c7f7e7046c99c392a63cad5f2c47faa7e4
SHA256b0b06d98da37e8451c95c70d3518f68ea2fa68ca106ccb4fa16f83a75e875cb5
SHA512a24010b82c34c74fe650b199dbc13e52bf5ce5cdc7b701b58644db9c2d7217015ef0892fb2e881b40795551c21fb3b71a913c4bb4d3ae0b1ea438f8ce3d5740c
-
Filesize
11KB
MD55615cc94830056495874a75934640f64
SHA1e7d7545f7784909f51339b7530b865999bf91566
SHA25613c2acfa6182748b8e0c105ba44496e1f059fc6ea5a6d76c042b3b0829161f18
SHA512e06f4c3eedecb3171f034213981645f43bcc09a9b0e4e84fe173f5e3939b262935bdc72ca4ba8169065734587397e4750d5413c394b8a9a99c48ca4bacbca020