Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
71c03a6f10889f051168577c662052b6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
71c03a6f10889f051168577c662052b6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
71c03a6f10889f051168577c662052b6_JaffaCakes118.html
-
Size
157KB
-
MD5
71c03a6f10889f051168577c662052b6
-
SHA1
10b726eb573c3962efd1731fbeae58ca406d983d
-
SHA256
14859170d480d5572746b9578ce6c09aab8b077ff75a25ef2914af9022a280e2
-
SHA512
d90c3bca1a1e97bb0bec7863af18102723bd913f04da6dfc820a1e462165f3c0550b95f624874f69dd153e11f75cd4534c9610bf6dcfe10ca5c354598356c2d1
-
SSDEEP
3072:SbmHEmnlQyfkMY+BES09JXAnyrZalI+YQ:SbmkmnlNsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 2028 msedge.exe 2028 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1492 2028 msedge.exe 82 PID 2028 wrote to memory of 1492 2028 msedge.exe 82 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4956 2028 msedge.exe 83 PID 2028 wrote to memory of 4676 2028 msedge.exe 84 PID 2028 wrote to memory of 4676 2028 msedge.exe 84 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85 PID 2028 wrote to memory of 4664 2028 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\71c03a6f10889f051168577c662052b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb533746f8,0x7ffb53374708,0x7ffb533747182⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,379304588710648616,18401585664465992914,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,379304588710648616,18401585664465992914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,379304588710648616,18401585664465992914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,379304588710648616,18401585664465992914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,379304588710648616,18401585664465992914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,379304588710648616,18401585664465992914,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5cbdaa738ce0866ff9756c4c32410b6e5
SHA118bb87748879cb25e8dab99d344f8ba79697c249
SHA25627d7bf6f8692d930e3afb4e814e067a3a8e43299a3aa1a02b344a0a8966746a5
SHA5124dcbf5e1b953dc3eefb3896057fc3279ea6ebad0afab20841c8fc516d68330e627c048115669aaae9cf7e2ca7bfaee18c394c0f1f55678bc660c8f408ef3f4a3
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD5c25c386e0a331e03a3972888044db51a
SHA1a425098e06f03158fcf9ab756aede4a0e007b7df
SHA256a7ef5712b6a71ec8e22bfcd362682ca046e85c81cea9c930be38a84437fedddf
SHA5124b323f7664f27570d8d640ce3b070b4eaea61b50258699e6d455aeac19f4a527ceb05d8b518ce92bca30da40c0bf72d6ee10218606000cc047cb879a286586d8
-
Filesize
5KB
MD55f65aa2f13714de477abdfb3e40160b1
SHA115f2c7b2e42991266a4014cf44164c408f40a38e
SHA256722199a3978581011c676e8c512c25907a8945ab55a4ab5ab7b8f52d7fc2620c
SHA512bc7c7a36a825a3a60b2eb4155aa7c12e0630fa42fe6fe980f7068afbb922621c5e57ea4194f8f332d53149c44ad5c3ac898b6dee96af1e8ba341f9cabfa5c811