Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
511b69e9f6d7f2c7d27b584d59916d9b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
511b69e9f6d7f2c7d27b584d59916d9b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
511b69e9f6d7f2c7d27b584d59916d9b_JaffaCakes118.html
-
Size
24KB
-
MD5
511b69e9f6d7f2c7d27b584d59916d9b
-
SHA1
5487d44db6cc0aa2c1308965539149b43385a2f1
-
SHA256
586a18260b5ddff484a4739aeec885d0a1010b4fbe7a14e52526bf02929fde39
-
SHA512
88ec197f3ac75e0b4469d721c7589e8f184a2890975a60a0d0e6cc180b50c0e66c21c9bad983c67728a7a5f0ac0ae4d311e2353ea76b1ec9c486474a7aa39174
-
SSDEEP
768:SI1wpYCqC0C6CiCU6xcMq4NZNnV8qM1AXG:SNpYF7t1h0cM5NZNnV8q0AXG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 1952 msedge.exe 1952 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1136 1952 msedge.exe 83 PID 1952 wrote to memory of 1136 1952 msedge.exe 83 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 4952 1952 msedge.exe 84 PID 1952 wrote to memory of 2524 1952 msedge.exe 85 PID 1952 wrote to memory of 2524 1952 msedge.exe 85 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86 PID 1952 wrote to memory of 548 1952 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\511b69e9f6d7f2c7d27b584d59916d9b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff2ca46f8,0x7ffff2ca4708,0x7ffff2ca47182⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,4036900065070964456,10105890680244310187,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,4036900065070964456,10105890680244310187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,4036900065070964456,10105890680244310187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4036900065070964456,10105890680244310187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,4036900065070964456,10105890680244310187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,4036900065070964456,10105890680244310187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
308B
MD53d24c1ed7f8eafd15fd2a0a3e5b1aa23
SHA1b0e9919d1d1ae6f1c6ea028f02a998dbc7d0da42
SHA2564879e533a60fcbdf3a67a4627bfd3fd9ca923c62fbcd917b6836ea871734384b
SHA512f997bc070a38c4095e7edb9d29c070384037772d57c8f0265ee318a3075418746e329c51e0c1b90208b45c3cf86e6876b2c76237701a3a1832508d9c26c73089
-
Filesize
5KB
MD5fe64f6babe2abcf61515433d60c1da58
SHA133d1db42ff2a4213bca9cb6345768ce974d69fde
SHA2567feae188901a56025249546d2d51f9435b1175330c278aa1ce7fef7bb125557a
SHA512573b80c59c0b275fbbd743d795f81eaee38f577f6a5e6dea85df240327725e9b06eaebe670812cb168c29eb98f111605288f6aaa8bb6159d25098d9ecc4692f2
-
Filesize
6KB
MD59079f1886182de789f376a800e806114
SHA1cc134efba1af2b840cbfb3a1090e0bdb23bb7d60
SHA2562c50c0a538cd4bcbf70ed7dcc0e91dce6cca9348c94262de0847c8a756f5e176
SHA512d9894da69027d7d83adfd4dcb6e9ce43a6ed2f8bb031ad74fa40e94681df7aafac025a1fd58c9c6640f9660e8c565e352f0e1f65e093709b3585d7901950704d
-
Filesize
6KB
MD5f2b6d2f4f3fac801bc698792944917ea
SHA13368939291099b2512d4886772a335f6a5cf42eb
SHA25661be9d5be7661ab371e2b0c75b6bd46b48f53f28452b6530f3a96722997c25e8
SHA512c0cb69176445504c4a58ae78892230b1842e601bf1862aa9ca15181a1dcc7e442d6de02e3be5cb8598b86abe19b95844132aaf81cdb61ae55ccca91521cfb0c8
-
Filesize
11KB
MD5ac56f3088dba98d438b00e729609f65a
SHA16def64a64b6e3bef76b9fbfe7e00e5b1d5298a25
SHA256e043349d7c5d307f466980891f11b52852d49952197e6b8954153110ed47a0da
SHA5120412fc6b406e4a3c1bc24d263373f468ec0be2dce91efe7937586c554ab6181b89ece5a359213854b3c2c828c8576224ad9b86575dddc78b9f7a0f84fb94f988