Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
729433467e05dbc610ba7f914ddeb546_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
729433467e05dbc610ba7f914ddeb546_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
729433467e05dbc610ba7f914ddeb546_JaffaCakes118.html
-
Size
141KB
-
MD5
729433467e05dbc610ba7f914ddeb546
-
SHA1
d654a204930afc44f92caa20899a44132432e21a
-
SHA256
3e6811a90139932c28799207b5e36fb93e15ebc03f5f79260952804ebcde0ac6
-
SHA512
27fb47886bee5ac07ac71df341fef95c15df4114b5f8d7cb216e36e2ccaf5908863062aa1b18efc9743faff0c6ba22c4ec028d893bd2a4dce547d63eb2f70130
-
SSDEEP
1536:SCk+MZBxFuY0dWtx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SfBxJx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 652 msedge.exe 652 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 652 msedge.exe 652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 652 wrote to memory of 2520 652 msedge.exe 83 PID 652 wrote to memory of 2520 652 msedge.exe 83 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 4396 652 msedge.exe 84 PID 652 wrote to memory of 1960 652 msedge.exe 85 PID 652 wrote to memory of 1960 652 msedge.exe 85 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86 PID 652 wrote to memory of 2180 652 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\729433467e05dbc610ba7f914ddeb546_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdb8546f8,0x7ffcdb854708,0x7ffcdb8547182⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,17779863273396977389,12222483483409121468,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,17779863273396977389,12222483483409121468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,17779863273396977389,12222483483409121468,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,17779863273396977389,12222483483409121468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,17779863273396977389,12222483483409121468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,17779863273396977389,12222483483409121468,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD580a47a40afc42ca52bd41288bf584656
SHA10194b524ffd886b7b3073a40d2480edc219ef154
SHA256081fd35a7dba4bd8186a66d1b41bb9365ef20d566f672f7d161355a315fe5149
SHA51202c08bfdb0ef6d50af8d3655ecfbfc03904710636d6a8f0af6944aeb589bb644e30ab18a4768df75d2d499b8514b6b6c58a613c353c9c07ede1b7768b889d706
-
Filesize
6KB
MD5f565fec10f2858107622704d9d42ea35
SHA15eec340c92f743ef4ae3ab9a02c8ba22c5cd6705
SHA25618c2a0ce51bdab1f173898a25a13ad1b60f605384b1427ec30faa84d55da092e
SHA5129cd46a0190216b1c639500916e65dbfa2f85f9502e83f47bbcb3ca12e503a4e190f537ae3f2c2f237b2d67369f48b63ba69afc2ee4ebd05071abe083b7fb5de1
-
Filesize
8KB
MD52d897e9e66c00602673e4bbc80d985e6
SHA11afe5687e8b20b75f189d4ef126357644988897d
SHA256232fade4ea7a1c8bb5258545af5df2ab9e060fe4c3f23eb1172b85f4f7aa15f6
SHA51234c9c7c72fde5f86f2d5abb059158b01146a5aa8de2fe13645cefd30220e6e4379ccb1b489952b7c9d25f3119a95aad4fff1348e36ad28f7a3cb49aab7ec3900