Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
684d180041d0a50d11ba7423259e4ba2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
684d180041d0a50d11ba7423259e4ba2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
684d180041d0a50d11ba7423259e4ba2_JaffaCakes118.html
-
Size
218KB
-
MD5
684d180041d0a50d11ba7423259e4ba2
-
SHA1
39a001f6323587090d27c7d2647f24b76094b97f
-
SHA256
b97eee1c40f354de8359e105ed62367061f61e68e9892eac1e95efe11976cd92
-
SHA512
4d170f4d7fa7cbc62e176d3b7206bc234bb3507296d1f0e8099bcdcaf5ddb986f843e136e6a38c2bbe4874d990eb84272a8e58218840404fd5f62bfb97bf8d9f
-
SSDEEP
3072:S4jcKaSYxIrUlyfkMY+BES09JXAnyrZalI+YQ:S4juSYWrUQsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1728 msedge.exe 1728 msedge.exe 4540 msedge.exe 4540 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4540 msedge.exe 4540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4540 wrote to memory of 1868 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 1868 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2676 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 1728 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 1728 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 704 4540 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\684d180041d0a50d11ba7423259e4ba2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17620581827731931991,17799595405567732847,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17620581827731931991,17799595405567732847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17620581827731931991,17799595405567732847,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17620581827731931991,17799595405567732847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17620581827731931991,17799595405567732847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17620581827731931991,17799595405567732847,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5759ccb0d62f74bc3bbb48376b4a1c63a
SHA1dba50100cc3219f658fa74d954a26b0eb71a0686
SHA25652373d50d1988b04987b1935e2d8216d3bf653942abf0b5711f9aca8139cca75
SHA512f3502a00ea4a2de85424ae223bdf322984f33ad0917f3b007ce7181c8e01f5267cd03feafa1b02c088c7cceea8f369cc7ab29a3edfe55fa6b429a3449ef29e30
-
Filesize
6KB
MD59e391006178d990bb8cbf25b67895eb3
SHA15242c95794cca04f4cdc04840e30501ba125c1d9
SHA2563a81fa853ba526a91a20dfa2b20240f0a82da8282dcd4647bbda38016a4e4940
SHA512782896c802a7367ea804f7b5143ca0eabadca1fc657e3f3da89280f031fd16a0a79552a174d7d826ec3bc534276507c895434aee7479a236bbda4231d14db90d
-
Filesize
11KB
MD550f0e9a045737015d8f7d6ea7b58fb05
SHA1e25ca935b2aceaabb9deab8014a7a032cae6a6f0
SHA25648b5158dce325c0e8bbfbb822cbb6ec374b06b643272f58d1869903486c1b682
SHA512e14be55724d03f01a08c3cb590bdc5fc4f8c0d525697b97698253515c39cc7fb6e24d8130a0781ee346db9491f08dd17b9a664105f62b4842518d06a78618125
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e