Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
4f70d100e4f4fed8b377304237e284d7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4f70d100e4f4fed8b377304237e284d7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4f70d100e4f4fed8b377304237e284d7_JaffaCakes118.html
-
Size
118KB
-
MD5
4f70d100e4f4fed8b377304237e284d7
-
SHA1
189fad0f133e850af163be92de7a91379d784438
-
SHA256
6563040c435a7d3e6c2238d6d5a44c1b611ac704a578e49d5ea011e3f32f774d
-
SHA512
05c60a965d7b563a4fe0f3378411930e92c7ee847dab6f19aeecb0892ebbeed9da1f0711f777299fe6dd80e727569714ffd6b2d629b7cc0e6df95afaeefe6529
-
SSDEEP
1536:SRtUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:SRtUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 3300 msedge.exe 3300 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3144 3300 msedge.exe 83 PID 3300 wrote to memory of 3144 3300 msedge.exe 83 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 4084 3300 msedge.exe 84 PID 3300 wrote to memory of 1692 3300 msedge.exe 85 PID 3300 wrote to memory of 1692 3300 msedge.exe 85 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86 PID 3300 wrote to memory of 1468 3300 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f70d100e4f4fed8b377304237e284d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa80746f8,0x7fffa8074708,0x7fffa80747182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13893957505123736761,17997793493937059710,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13893957505123736761,17997793493937059710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13893957505123736761,17997793493937059710,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13893957505123736761,17997793493937059710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13893957505123736761,17997793493937059710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13893957505123736761,17997793493937059710,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\795f4450-835e-4148-927f-e7cc554ce818.tmp
Filesize5KB
MD540035d679f85019e31ff44492ea4b890
SHA1c423410d1cbf2faa1ddd3bd8f3c5f71953e8686a
SHA256073adf1d25d6c91afaf2fd6bd5b77f5845e547b148097bc4e9aeaf5701d74a7b
SHA512985eaa894e71427c948a49983cb8290fc208d24c418ea623e25c06222d82c06758f7ff91c4bd4659c9ddfe9c647a227eda2490170c224ba49c94c356ca169443
-
Filesize
6KB
MD557a16edb2da9f4a87156cb460a763804
SHA14d1c7310d1795b9b31a20b416871a050237a0979
SHA2566ad0303bb0f302ee2f6323f78b46e5603184448647d3cfd933ddadb6ddec2311
SHA512d104f5170358cb8b7eb06d2598b5ceb7a609188b56204f5d5310b513274755de88a899c61120f5658047ea5c4d6789339ef982916f8f76f40f36d17959e4f8a4
-
Filesize
11KB
MD5cd5c877dc0e1414105c8a2e6fcaa79be
SHA158869d7405ad4c5dafc197901a0538dc8ac941a5
SHA2561e339b22d9b3a5d3276e9ebef1d68bbd4ca89ab83920015be02dd38ec916150b
SHA512ede6b81302002f14d1eca9ff90bf0d0b753f6608eef76a69a4c1be05b9e213e736266995f2ac5d164fd850c928d409e239255d91b2cc8b149e1baa6e193893eb