Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
653d354e7a3abba8e29a72c5ec83b162_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
653d354e7a3abba8e29a72c5ec83b162_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
653d354e7a3abba8e29a72c5ec83b162_JaffaCakes118.html
-
Size
220KB
-
MD5
653d354e7a3abba8e29a72c5ec83b162
-
SHA1
55ef6c061f4b55aae2e20e62b328b513b7ae2441
-
SHA256
2451bbe80b8c193b447778dda7be4b9a3a7fcbc6d4812f6b2684cfff0a706657
-
SHA512
35b27c2140eb4dacc06182881b527c0df83f2f00a769b73b92723116736021bda78cc9664e82bccee438cd37c9e494346dfb5977c117518f6d0a4832432963ac
-
SSDEEP
3072:SrYbqMRK8BP1yfkMY+BES09JXAnyrZalI+YQ:SrOh4sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 4744 msedge.exe 4744 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1644 4744 msedge.exe 85 PID 4744 wrote to memory of 1644 4744 msedge.exe 85 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1504 4744 msedge.exe 86 PID 4744 wrote to memory of 1156 4744 msedge.exe 87 PID 4744 wrote to memory of 1156 4744 msedge.exe 87 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88 PID 4744 wrote to memory of 1468 4744 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\653d354e7a3abba8e29a72c5ec83b162_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9aa2a46f8,0x7ff9aa2a4708,0x7ff9aa2a47182⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,17912080821005980014,12236166655101615166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,17912080821005980014,12236166655101615166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,17912080821005980014,12236166655101615166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17912080821005980014,12236166655101615166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,17912080821005980014,12236166655101615166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,17912080821005980014,12236166655101615166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\73b17dd1-b489-4ab5-a2a7-a9fa51adcd7e.tmp
Filesize5KB
MD5a207096379faf21f573e2943b53d4c66
SHA11b8537b4da5e165919b6230bba0a74c01f26de84
SHA256e36ee19390c0d49c5bbfd04b01b3cd36810d2f78060dd58e7453d1e6a4b0c068
SHA512536361d685015f7b50ae304e2cdf3e3f3416ea36ff5db3f489256071d95a80a73d080877a7e2b977c42da4f3f23e8230c1fb44cebead297505b1819950c989ba
-
Filesize
6KB
MD5d05095ecab9715ef39a798ec7c7b9c12
SHA170d6536e18e1a3bd5590f5e50f467facded849eb
SHA2566bb70f1558c387f5635eed17a971ee3edf0a402b20bdf7bb3cae5d5f59b37681
SHA512ee2843d7f4045c8dcfc1bc035fcc2a1c381ae10a93242e5a65a7172e74d6c5888c8c0e5d7bb0abd17fe46bb94b5ce62bba0f41080a6a4a830eae2668c203fba3
-
Filesize
11KB
MD52d4000aebc293cc8ca5a3600a319f77e
SHA10317a8841ff750e1f817ccc5eb7fd3a47f97e3d6
SHA256beb16ad3f56ccf0010d726b3047d5d254a470bafe16debe763e73d6d10817073
SHA5121f219e22adc2d257559cd7d2157e583cfab607cff12e5ea6345d87561ebec16a4f40d8549cebef670c509f02295014b589605bc95b0f4603d5e1a954885cc3b0