Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
603e56f8fadbdf281d8e38693912f0b6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
603e56f8fadbdf281d8e38693912f0b6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
603e56f8fadbdf281d8e38693912f0b6_JaffaCakes118.html
-
Size
19KB
-
MD5
603e56f8fadbdf281d8e38693912f0b6
-
SHA1
fb7ecac52f7df47493c2940d9def2dda784f6668
-
SHA256
edc7cb93b597995dd43293b0da92708398092776cb12dd30d3361494a729e027
-
SHA512
efafe548ee1981d0fe5f8bc21399b887b39ef32dbf6b2077b58f628e49d3ad19253a96c98e2053421ade0c992698860629c8db9c528887810afa0ffbeaffc8c7
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIm4mzUnjBhWY82qDB8:SIMd0I5nvHFsvWrxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 740 msedge.exe 740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 3008 740 msedge.exe 82 PID 740 wrote to memory of 3008 740 msedge.exe 82 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 1248 740 msedge.exe 83 PID 740 wrote to memory of 2900 740 msedge.exe 84 PID 740 wrote to memory of 2900 740 msedge.exe 84 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85 PID 740 wrote to memory of 3344 740 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\603e56f8fadbdf281d8e38693912f0b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942fb46f8,0x7ff942fb4708,0x7ff942fb47182⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14015967198816431739,1593249283659825144,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14015967198816431739,1593249283659825144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14015967198816431739,1593249283659825144,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14015967198816431739,1593249283659825144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14015967198816431739,1593249283659825144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14015967198816431739,1593249283659825144,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5fa7c64dc91f8179600dcd4fc135fd447
SHA12038ccea104873cbec21da4a71029e4320bf9107
SHA25647379140f926fffef91371dd5eb9e539bbba1d122da4339ad32f03a5fed9d335
SHA51294cd1610801d49f38eed2cc7fc5be1410e8503821ee09486d4cec43022a74813ddd360f5cd337a14eab119d76ef176d41467a119af6a69dd0e538927f443db72
-
Filesize
6KB
MD5563a71d58f86d70eaf0070d186ed702d
SHA116bb3e39a6ac060f3d12e2453fa0b74ab885298b
SHA2568a3a785328248581ab9d04b29f46aae015084ded55c2005975fb4a9878401fe7
SHA51203819f14bb89bdef2c9e225eec682e56bcf1d383b6654b08d054d10bc7a670670b33e0720acad2ba9c971ad5085b1edf23d551faa30a4d5d93ce03960faf3afd
-
Filesize
6KB
MD51cebd6b31a877b6ffd75e2c2d1e41d4a
SHA1e2cfc9b6114ca6769e84ad6d2ceb55b885974734
SHA256d25e4d06bb8839e1db54be6795d6ecdd8ceb557f5ec858572c847be3c98f5f43
SHA512edba2a002263ab85b6c4850005751a61e187290176ad0c75d93f1edbcfab0035ad304a0230b45534e2b3b7331cce7d151beb6d8687b3292410c31422e820d2bf
-
Filesize
11KB
MD5fce7ab4001d1254b853429b3723f6497
SHA112f11f593d3867dbd0aebeca597ef6012d691efa
SHA2561eef2cf74d8a33d9792f8681fb959e7b9b6fdb76e0c998fb5823e305f31c570c
SHA51232de08b9461f7c84287facda878abdae74e999272c2c8d314ab1eaed2da3625e38a6a802167322bc860660a9970c38397a113ebe43dfde239f55809f754bd8ba