Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
638c097416e6fca68e7b4a63a1f154ac_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
638c097416e6fca68e7b4a63a1f154ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
638c097416e6fca68e7b4a63a1f154ac_JaffaCakes118.html
-
Size
138KB
-
MD5
638c097416e6fca68e7b4a63a1f154ac
-
SHA1
3f7690ba99a152c7f576ebc729aa9e21c82162b0
-
SHA256
b9c0b78d0fb583d283c9b38d07f201c716db7a936a88106f6d2bb57cda57fcfb
-
SHA512
aa48e1032f8511994ec80eca24c7f7ee8cdb003afcc301f2c02ca7a2b222811f16bd50612c5bf3f0f01d26a041b9374d8f9450766b16687231623554c78d5034
-
SSDEEP
1536:So5EyIlSTssyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SoosyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1632 msedge.exe 1632 msedge.exe 3596 msedge.exe 3596 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3596 msedge.exe 3596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3596 wrote to memory of 4940 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 4940 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1644 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1632 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1632 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe PID 3596 wrote to memory of 1920 3596 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\638c097416e6fca68e7b4a63a1f154ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6307486470009448168,2034243724641919568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,6307486470009448168,2034243724641919568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,6307486470009448168,2034243724641919568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6307486470009448168,2034243724641919568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6307486470009448168,2034243724641919568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6307486470009448168,2034243724641919568,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD52a5a52e820232d673baf9299088f3e11
SHA1aff18960f3f4981751e6aa33df1dfb4026542467
SHA256810e33eeed95c8373fbcc44cba3c5a234e33c7dea653de2750c1b4e4374c56a3
SHA512bbd782438b3a42ff5d65883610bdba7831e450f59e4d5aad03e6ff0028174dc964f3cc1fd3499cf4cd517c2e82c669b9f27fdab2cbfa1fe36b0c66e5580ef473
-
Filesize
6KB
MD56bb11b4adc839f63eb7d02346e03d059
SHA17c94e0024eaabf4e1a8c4969fb4d2bb4ad823113
SHA256c7ce7c75b79719ddb7781e1f57e195b551d34930452dac0eeb1a4698c433ca43
SHA512c55ec2f0ca088534a4ccb8334786422e61918326d1ca4104efc849d6b6e28d57dda5ebb1d0796c9567474708171730248aded526d65a0ba1941c3559a6c5bbc4
-
Filesize
11KB
MD552a8397c755d328c538c575633b44837
SHA10247894dd696898c509e57317c7c8fd31a9d25e2
SHA2565b93944b13d88135a2f6ea14b9ac9963df911d118742622090be37acaca92001
SHA5127e394a8599b3ba8e2d19805b104259ea2691939080001e91ed71e2346792c7c6729cc09956b12fcaea428d879fa4bb2c793f5a7e0983d16a36da5a842cfa1865
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e