Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
67e8775b3c5bbf0e286d8a06e5666f76_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
67e8775b3c5bbf0e286d8a06e5666f76_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67e8775b3c5bbf0e286d8a06e5666f76_JaffaCakes118.html
-
Size
144KB
-
MD5
67e8775b3c5bbf0e286d8a06e5666f76
-
SHA1
5ef293d658bb8f7dba49fee93f382e48a4acec5f
-
SHA256
dad9063cd0273b8555fcca6d1961ccdb1e11a158426251142012a8e9a5ee98df
-
SHA512
8fa740fb2d0348e8244fce4c163fd54e820c07477772df73fe249911d596777ce7b1323f06e5c4424083acb0fca3d8978b40ba40b548ce0243a147695609815d
-
SSDEEP
1536:SoZaW3uuYjHx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:SUtYDx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 3520 msedge.exe 3520 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 2964 3520 msedge.exe 85 PID 3520 wrote to memory of 2964 3520 msedge.exe 85 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1348 3520 msedge.exe 86 PID 3520 wrote to memory of 1908 3520 msedge.exe 87 PID 3520 wrote to memory of 1908 3520 msedge.exe 87 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88 PID 3520 wrote to memory of 4120 3520 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\67e8775b3c5bbf0e286d8a06e5666f76_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,9496239121504352933,11223777853977032076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,9496239121504352933,11223777853977032076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,9496239121504352933,11223777853977032076,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9496239121504352933,11223777853977032076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9496239121504352933,11223777853977032076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,9496239121504352933,11223777853977032076,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD5e95ba55a9a372c40f5694dbc51817e8f
SHA1a22be76c7f81ef35bd6afef53a07870596e1f4e1
SHA256ec7b22e6b1281ffefb3426ae2a17096f2bb40086eba6c15b6f81391cf857b484
SHA5124228c28a23ffc62dceef563e45e054c671c476f740301a53c4690c410c5b5884095f6f230af3a1b3e836504d98ba3924631990476fe616b24d1fbde8ebfa9e68
-
Filesize
6KB
MD570cdc7b91679376feca0af0299021036
SHA1c8dc9345dd01532d5e1bd38edcd63f6ea4035553
SHA256186b32d10d82c700fd1d40e883fbab51505806870c0524dfef2def2a9d31b79f
SHA512020ba31c56bdeb2f722a502111ed13e127847be686486ea6462b8c29d89ff86dc772a5db6c2b5a28322352d131acc3ad30c017ad9eb29f928e639b384a00dffb
-
Filesize
11KB
MD5f47be554b05ce8063b06e332b1ae41b4
SHA1e1958279f8745f6a7fdcb3b8265ae4c3c66550c4
SHA256e857991a11e4825a87e6403faf21c413edf76847287432864b686b4dc73604e5
SHA512a819f02c231c03445cc617972dc7feb9621849cfa59c9e688505f034d42553375ac4f462cbf2de3e96dc9a068f7a41a37f6838d350f4f0435d93ad46c05f8c29