Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
726e141aa380a61cdbbbd756e012a02e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
726e141aa380a61cdbbbd756e012a02e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
726e141aa380a61cdbbbd756e012a02e_JaffaCakes118.html
-
Size
56KB
-
MD5
726e141aa380a61cdbbbd756e012a02e
-
SHA1
8e32c74bc2e08889a83ab63de4ec1e1afaf007ac
-
SHA256
7d8ea902719d4e5b43b38c6f96e70ad6eddd13a0548d342cefa953a86b30841d
-
SHA512
3455973b1bc9c857ec51dbd81c6093f20200bf598705c83e06acad366cff08dade330963359edda835c60a3cef2dfca034da3e2bb7b5310ab7f6a6bea9150ba8
-
SSDEEP
1536:yHWY+Q0JL3zZpdSnCrML0/tRmqNdHvnPQp4qrXlmiO3DxaO3Dxw0Sf3h1pW2UEWt:IWY+Q0JL3zZpdSnCrML0/tRmqNdHvnPN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 1632 msedge.exe 1632 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 4656 1632 msedge.exe 84 PID 1632 wrote to memory of 4656 1632 msedge.exe 84 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 1084 1632 msedge.exe 85 PID 1632 wrote to memory of 4808 1632 msedge.exe 86 PID 1632 wrote to memory of 4808 1632 msedge.exe 86 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87 PID 1632 wrote to memory of 1060 1632 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\726e141aa380a61cdbbbd756e012a02e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7fff1b9846f8,0x7fff1b984708,0x7fff1b9847182⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2150886068349554380,1152118652501125199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,2150886068349554380,1152118652501125199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,2150886068349554380,1152118652501125199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2150886068349554380,1152118652501125199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2150886068349554380,1152118652501125199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2150886068349554380,1152118652501125199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5335f2732161768ea7e0118fd1a7da12e
SHA119a6dbe709a02db303e6539bd0294f1fd00bebc7
SHA25613216e8a652fd3c4f10c972e4ac024a23ecc982d426b92393350be9d581debc0
SHA5124e341bd22cbde65f1b81a7a0a9d8f5da3265e4745c69cc0807339c245a86c19a1faeefa8e943d0d05005c6e7e88041dd9aaa33707ebecb299448760b8878c838
-
Filesize
6KB
MD596dfc73fde8face9c8382ed0e90a62b9
SHA107fa6f6dc4eea3d366dafb1867e5686a80c9bc47
SHA256351fb22e4ef8851795cae23178e9559a0490b3c69e59d59c9518edb83f6d99de
SHA512079a4895b2a7dd95b9d1ced0944ac5ecb8dc414b42cee1288b2c108eeadde39c831a483dcf63c27b961d361844d686ce83191838b25b4865cd6fa66408e92787
-
Filesize
11KB
MD50ba4d6585364375ae5a4fc4410ff7d6a
SHA1b3d161ebb3d3a478fe1fe2a7a3002799d8efa8be
SHA256f2f4f2bd138a38400e56c80cf5c125761c437099dbdc5adba4f141847db1389c
SHA512bad5589e0d037f649806b4f12bd7e87d19d1007eaeff551ac1aca5e5d271453985a21a59b7593708f6b22d5728f2f7d9e44a267d03051759958a3be74a2a3504