Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html
-
Size
157KB
-
MD5
62dfd7040be6668b3a57eff7be9f0991
-
SHA1
c7c15a6a5fcdc43cea85a2620bd9ab2edbcdf6c2
-
SHA256
5011df1f0a60571947079e3c34499d45aa4898aba329024c9ffa0bd9ae9caa51
-
SHA512
5e9b5f910d927f8ffcba5b23a36ef6fd15a751cd409694802d92e1831bbb6f9ce9afb8f705bdb717070457becf23a09c2c4e7b47d2f7e9128ff2784167f679dd
-
SSDEEP
1536:SIrcFqSLIOvldBMA2yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SIqqYvCdyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 4240 msedge.exe 4240 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 920 4240 msedge.exe 82 PID 4240 wrote to memory of 920 4240 msedge.exe 82 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 4880 4240 msedge.exe 83 PID 4240 wrote to memory of 2016 4240 msedge.exe 84 PID 4240 wrote to memory of 2016 4240 msedge.exe 84 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85 PID 4240 wrote to memory of 2600 4240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61f746f8,0x7fff61f74708,0x7fff61f747182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5919690423931893256,4042478599337127937,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5919690423931893256,4042478599337127937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5919690423931893256,4042478599337127937,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5919690423931893256,4042478599337127937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5919690423931893256,4042478599337127937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5919690423931893256,4042478599337127937,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD52ca01c5228ba3f681672f8a8d5b1f8f1
SHA10ae967ad41e7c6bad21e955b1506d00286f41721
SHA2568adb3bf503a4a0b2190f7ba5d3f4246f581f4148fabbd2f99933fdb92042428d
SHA512a9523fa347dd4069373ffd5471db326732bd5cd6c62f466544f8cd8235c2792aae434daea2bbbcb277de0bbbd615115beb15cbad1456efd41fafc23d7c9f13a3
-
Filesize
5KB
MD58f94527b1808ec63ce5c477d4b31ce96
SHA1b48efe07361b4dbee1d8a7da4d3c91dc5848f2a2
SHA2567aa88a6a7d778d6a744384c74d39895196e997665b3b77130cd45b4e440a2ada
SHA512b0ae832f0009bb28ee5c3ca4818bb9689f664e04e0adab6b3446fe9405888b493e408097b9ad9fb4adaf225072e74acc5abb2c223c32595545d3534d3162772f
-
Filesize
11KB
MD5b3a066a2d7e61af899017f18001c48e2
SHA194d503ae00d95a9dd04724e0b13bc844055f2469
SHA2560aeaab40e4f84450020d75ba3caef337ed30aa09ac28f855ed2ff48315750526
SHA51287d99bcb3d4ebbf101166728efdbe604af5d2f7b8296a585dfbff4cc87fa701e32740bb0c1fd3515f50b4d6104a67a48cf3f0d3adaaf3b304b24a82d0f213824