Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
684fd1027f2fc438b00117ead9f5bdcd_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
684fd1027f2fc438b00117ead9f5bdcd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
684fd1027f2fc438b00117ead9f5bdcd_JaffaCakes118.html
-
Size
46KB
-
MD5
684fd1027f2fc438b00117ead9f5bdcd
-
SHA1
7690c834e6ee282cc576b3f813ccf66ca4add89a
-
SHA256
cffd68a5ef898da034a5434144ac07923092e22d6eab45c5890851d557b82be9
-
SHA512
a776ed02944799bd6e31a4cb3d69033af9da383e7fb0d6e2c711832dfca76e054f20195e72ac56d7a71d89ce3d5efe278554273ae86aa9a55002b61774231379
-
SSDEEP
768:ozOpKVQC4CQCnCeC2CuCNEoRMc0POPRlFc0YzqwAx5HOqun:yOUVQBHGBlxyEwMIlFcnqwAx5HXI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2380 msedge.exe 2380 msedge.exe 3408 msedge.exe 3408 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3408 msedge.exe 3408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3408 wrote to memory of 4768 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 4768 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 1076 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 2380 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 2380 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe PID 3408 wrote to memory of 544 3408 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\684fd1027f2fc438b00117ead9f5bdcd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffadd346f8,0x7fffadd34708,0x7fffadd347182⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9755903998091155120,10592421033724740774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,9755903998091155120,10592421033724740774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,9755903998091155120,10592421033724740774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9755903998091155120,10592421033724740774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9755903998091155120,10592421033724740774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9755903998091155120,10592421033724740774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD55b4194105b0726ca1ec548ac9f58e5b0
SHA184a88a72cd7c3f10de76be9591baf34fcf65f144
SHA2561dcd509a1b2d3b241b931a42983187a84d610e7d2f9df3def3ca1fb9fe2d03f3
SHA512f5203abcfaf63ecb93a341ea88e0b983c5e53aa581c83cba46956670191e68767475ce9c09948d85b494195cf323ac007981356090e0bcb598a7371a880d1e65
-
Filesize
6KB
MD5ca91ddb1b58baa7da2727334017cadbf
SHA13543aa55290ffca85248a5f19d18c28af5fa9633
SHA25606a820c366b201d6f0ab8f81bd94df59feacf0b286dc2f45913d8d1b0e2a649b
SHA51249e6cf98d6e3251e47ad514fcb28ff6c8376c355d4c7689f779ce34239a7f8431c945d4e756dd8d3dc29ed8ea09d6576447374018cae42cb64a4f74f77ba8f47
-
Filesize
6KB
MD53772aaef4c003757769d5f78a9cd283a
SHA19a0aac5061b9b8da61ce8ac266b232397005144e
SHA256d8b386687515666bba3b17d3019fa3d7a9b5f8476c4d004dc21933134c1eab6e
SHA512bc1d6c7cc499de5769504e58f9d39ee6c48b44bf8b8da2ed94152578477d512b38cc23e9ca6c073b17bc1284bd183a3d20e77240ea67b53a989e9fccfc652f02
-
Filesize
11KB
MD56887d763e69a41acb3d4317cf7302559
SHA1252b4e2cfa963618ddc0cdfaaa2e501bfcd681ce
SHA2568d2ccc791499fa32df8a1b3913b92bae0552b500bd6f3bc50c54dd6576756801
SHA5123d1d1fe717fe1aea3083c852fcd27c535dcd7b9af7a03458dca17dc1fb93e794f541055560a03b9ffb28fe6b7fdac5b2e223cd90e992a73466e5df2edd660076
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e