Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
4ba79cde4aa9900eb319b57bf7c928a2_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ba79cde4aa9900eb319b57bf7c928a2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4ba79cde4aa9900eb319b57bf7c928a2_JaffaCakes118.html
-
Size
214KB
-
MD5
4ba79cde4aa9900eb319b57bf7c928a2
-
SHA1
7ff79ee3f15b25fdb1bbf4a97b25beb66f7cc98f
-
SHA256
fb3441af666e190255cf2528d6b15e25bc178f1f2f224deb714247506f8bfd85
-
SHA512
de59bbdad683057c11558fc22c9396194a3fb7a0677888de6d987ba395fa2471058c421145bf595f2863edaedd38abacba48d1c163c4d1bd91e7ff340bb29aaa
-
SSDEEP
3072:3rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJt:bz9VxLY7iAVLTBQJlt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3052 msedge.exe 3052 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2800 3052 msedge.exe 83 PID 3052 wrote to memory of 2800 3052 msedge.exe 83 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3096 3052 msedge.exe 84 PID 3052 wrote to memory of 3476 3052 msedge.exe 85 PID 3052 wrote to memory of 3476 3052 msedge.exe 85 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86 PID 3052 wrote to memory of 2812 3052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4ba79cde4aa9900eb319b57bf7c928a2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8777125896111021471,8954579575817520205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8777125896111021471,8954579575817520205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8777125896111021471,8954579575817520205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8777125896111021471,8954579575817520205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8777125896111021471,8954579575817520205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8777125896111021471,8954579575817520205,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD533b0db5c7575e618b198cab1cdfe65d0
SHA171ad8c50e9efe92de8d1e85857e62539113bfb95
SHA2562c9ebe9c7412d6d31b0e13cac24c254f02f830e9fffa462bcb4ec20babfc8329
SHA5128cbff406b540d98ad4f241b91bf0f48034ac1572e858a6c389aded719cf3dc72c83e9fdaec99095a76f4387148c812538e76d736966ddef33c50460e969df412
-
Filesize
6KB
MD55793970f5424a464bd07da8a5b742239
SHA1bfc04876fcdcd87b935874cc5a55b53246c2b713
SHA256b18b289014eee070c962c9452783988c60e56623c6ba671e7481c11e39b2dde7
SHA5126e12748d5eb585b36bff8805d7bca8474c8815cc538a828e0227065adbc97909d10b6932648c64fff592b1f51ed83690a97e0769575be8aad630fc9bf6a2937b
-
Filesize
6KB
MD5f723b1c659dd3262872fd817e9c09be5
SHA1a7e525402f6374ab1d4c5a3e7931a34cf5f7a360
SHA256ead0fa7a5704fe5c7704f59e2048936e764fe3d857c915a57119b354959e338d
SHA512b14fcff4c80014a230e6284c20d2824f7a6e94cf2ba52fff753aaa82c6bed62255968a6a41d81003a74447920cbcd6cf76964024ff9709782ee468e303f41ad1
-
Filesize
11KB
MD5cad82dcca60a91389216d8b126607c51
SHA18a69b8f63c09db2e62305a7d721b831e4ebb35d9
SHA256d9d10f7462517426b01862a677c6201579a26762049dfe10f9751c0a32399c5c
SHA5129da071611ddd47c1d3e01152f6ef95d59525b5f9101182a8e6a660c7c098543027b3cc6c99c05bb06121fafa1db078ca04559e93f18d473ca25af40adcd18acc