Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
638a009a8203a60d43d1fc0b00296cc9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
638a009a8203a60d43d1fc0b00296cc9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
638a009a8203a60d43d1fc0b00296cc9_JaffaCakes118.html
-
Size
17KB
-
MD5
638a009a8203a60d43d1fc0b00296cc9
-
SHA1
39bc42fdc7adcb295c0f787f4c42cf71f4435735
-
SHA256
1e22e23715976a103200da4aacc358e53d3d4c43cdfc1a7bc538295f38d1bf64
-
SHA512
03c84636d41fb5989dfa5b5ff0d6b5c83911326116d294e411833822bc83183a0b9ea4d7d52a471970dd11c73cf9c809db4a3e4e4a42b673b130a4686694b007
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIg4yzUnjBhmY82qDB8:SIMd0I5nvHPsvmrxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 3188 msedge.exe 3188 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4228 3188 msedge.exe 82 PID 3188 wrote to memory of 4228 3188 msedge.exe 82 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 3488 3188 msedge.exe 83 PID 3188 wrote to memory of 4588 3188 msedge.exe 84 PID 3188 wrote to memory of 4588 3188 msedge.exe 84 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85 PID 3188 wrote to memory of 2404 3188 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\638a009a8203a60d43d1fc0b00296cc9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa270646f8,0x7ffa27064708,0x7ffa270647182⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9a192a79-e1f9-48b8-b57a-303c93433795.tmp
Filesize6KB
MD5a7fed70cfb33b34498a8d1220998369c
SHA132162ec07b9e03c6ddaf1bf412aacf95f5a8b3ee
SHA256626a8bc136ad486a05dfd30b7a1e9b2ce0d48743e4420e6985e0e2e279080bf4
SHA51204b385e14400fcb72d4a70651e50f5ba55ff1f49a81e37efbd2549483fd6972e7cc40e9c8de30a131236489bd2ca937c6780d063d582739d0a8d8168460656eb
-
Filesize
5KB
MD54077c09972150c8ebba8b8868599e91a
SHA13abf9bc65f897fccaec1e2667ffa50284e199b67
SHA25694baa70a555d5e861e1c02d2d7562f0a88ea16cb6cb7e74edc4976d6d0bad205
SHA512753d0dde7b18fe1d6f0b8012097d517b75a23c91937a967756ae7af8ef32c4b0176d18c4cd99219b4496bcb613a3b6ccf008d7d2eb6cb9237aeec37a50030f4c
-
Filesize
6KB
MD5f27de418b6d9e0a837790464363f6a62
SHA14b129d1188434d00b67ccf3d4a0c0f1c457c265a
SHA25612508c6d9b9a67fdc9b1a450c9c200eb69acc3f6b11a85c7f1dc4579a6de1514
SHA512ec3b36d677f5982c3839927a9c146a262a2ce10ed68006287ea686982f59269fc04503938ed0f974465f07c3d4bd836921d6d554e7318be7158198cba166934c
-
Filesize
11KB
MD57b275cdfa9c33901e41a8c000801bd08
SHA192c43d1a31b2ff7addd1a14c7bb51beff0f1ea53
SHA256cd25bd30898a08ae7a58727109f4dfed16358e3fdaca8afa96aefba1f69249be
SHA5125e1b672fa25b1a007ad6a28ee4f520ec3239a15bba006ff06b5566c9b07d24120ed0ae6967c5cb9c0cc2fb62213be20e35a65fb950d86857bfb1db93f3832d44