Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
4e2147a55ea4c870b435307b2b597326_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4e2147a55ea4c870b435307b2b597326_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4e2147a55ea4c870b435307b2b597326_JaffaCakes118.html
-
Size
139KB
-
MD5
4e2147a55ea4c870b435307b2b597326
-
SHA1
8fb73ce57d501a586158e6aaa88aebf6aa75f1a8
-
SHA256
eb12cf51b92edbaa87d384087b286041dd0f11832516d034690ca84900c12579
-
SHA512
cd7899383e5d3900cff92961128956a25311f4ea2ab041df1bb6e62c37125fffae28e920c293caa059962e39e9089f15011a6aee1e132deb9253fb3577eb7a2b
-
SSDEEP
1536:SIRNYBHB6vtilEDyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SIRJZyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 224 msedge.exe 224 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 1396 224 msedge.exe 83 PID 224 wrote to memory of 1396 224 msedge.exe 83 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1336 224 msedge.exe 84 PID 224 wrote to memory of 1888 224 msedge.exe 85 PID 224 wrote to memory of 1888 224 msedge.exe 85 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86 PID 224 wrote to memory of 940 224 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4e2147a55ea4c870b435307b2b597326_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c446f8,0x7ff810c44708,0x7ff810c447182⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14469014097828110683,6061073295920094511,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14469014097828110683,6061073295920094511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14469014097828110683,6061073295920094511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:82⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469014097828110683,6061073295920094511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469014097828110683,6061073295920094511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14469014097828110683,6061073295920094511,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD568013f46e75ae881a5673e2aafb5565c
SHA17f34f90fe5d505b493de0d924471f0f86d324309
SHA2562979123e6eea5e906cbccf1ce4184c2f1711168885aaf3ef6d99561a7fdab3eb
SHA512175223bf0b6454eee4088da52cd846c736b10902aa9fefc419267b5a894f7d79cfbbf9bc5e27face56fd67d1b35252e189ee5e2d07c7594f8a5bb464a281266e
-
Filesize
6KB
MD50ab7e2cc2fee92266931d6575fd003e2
SHA1755e999cafe5cfae2f1ce4cc5351268d46f4f509
SHA2569ead2bdba4ac338564010a14231e8292a4260023c0a5f85da1c8ece59aa4721a
SHA51287c7c7e7cbc82f81560112ff062d767a865682e21ce3e6287f835a8351a5071bd4909a91b389b0f97792eabcb19c3bb034bac03be466e8986ae3e05d49282e10
-
Filesize
11KB
MD55a47a827b69d6981245772ca1d461465
SHA1bbe6d087d56cdebc25d9562343eadcedae209e47
SHA2562f7cb18641a700f1f68e1dcd6f2eacfd65e2a9602c2e142133116f6f35265257
SHA5127cafc48e5e18e2b017308859cb29c8ce2ace22960c8c6c84d59f16039ac111575aca9253c3374bad2851e7dd63ce651821c9d3b89bed56e41b16e923b76de88d