Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
640044954ca42b717270f286dce41de1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
640044954ca42b717270f286dce41de1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
640044954ca42b717270f286dce41de1_JaffaCakes118.html
-
Size
23KB
-
MD5
640044954ca42b717270f286dce41de1
-
SHA1
12d48a47c05315a41849433fe5d1203f4f2d7f0f
-
SHA256
93eea7a51820264d7ad335e095dc6fa135b04831282de0ccfdf08f9e4fc3a2ed
-
SHA512
dfb0f33e80491822f329a1341f274ece0a557514d1aa6b5ccb43ef70540707ba40b6a12ddb2f7db4d3c933098412a256f42e8cb94af1da94cb2c55f9fcd64cc1
-
SSDEEP
192:WLZLwKQZgUOgBRUOQHUdQ/uQe/pImBlRMB+RTPi6bTY5WafW8OhW1ThIlZ9LlC2m:fzRUDU2/I++01TulZ3YXD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1412 msedge.exe 1412 msedge.exe 2724 msedge.exe 2724 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2724 wrote to memory of 3164 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3164 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1196 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1412 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1412 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4240 2724 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\640044954ca42b717270f286dce41de1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa797e46f8,0x7ffa797e4708,0x7ffa797e47182⤵PID:3164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16927237392289950101,7160062184019416747,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,16927237392289950101,7160062184019416747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,16927237392289950101,7160062184019416747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:4240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16927237392289950101,7160062184019416747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16927237392289950101,7160062184019416747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16927237392289950101,7160062184019416747,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5f2692d6c57745570d71063afa27414bd
SHA121fa29acd6136d6124adb893cf5f3dcfe004ec6c
SHA25608c3fa36044a6b0ac54e7b9b8abfa9ad37ae6c1ece6a34051dd6c7c33e31a291
SHA512c0f96bf42352712e8e099ea95f032d39a26d0627371d33d8425871be83c24915ddc42b0defd82176d66a1aec810871dd8d9661b2a06616856d0c4e2e473ec536
-
Filesize
6KB
MD5d0ed3c957b254856d5f381da59d4bfde
SHA1ed0dfc8549a5971d0315f14adf1a0de9a5b48730
SHA256208d9275499faa684411826beac7f64e01b71d6c3a1c7d0bb46001a9074eadcc
SHA512efb4171911d7f58630c1fd7ada240cc8495d24db494b8296a5085500483c5e3c011636eb0213f31cc317d0ae18f52a090aadee749209e8ff6ab4517f6f656055
-
Filesize
11KB
MD5a0cdb10ec3e302a9d3531e73dc30049a
SHA166747f72c78c59e8a6e24f4c573c5de61b39f20c
SHA2567e05d7f9007d86aa29962da6471a62d1b3faf4f9b4ca039ded4ae65da7fbe2d0
SHA512e0ef98551f6f6222e635b5243ee9b3bde10abcb0fbb1e3298ac2721e27e16900825f030b630932d5d28e701c67643f0f330b9bf6a0f84f2e6512492f25476645
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e