Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
732cc0e9be2b473265e3594b327801f1_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
732cc0e9be2b473265e3594b327801f1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
732cc0e9be2b473265e3594b327801f1_JaffaCakes118.html
-
Size
1.0MB
-
MD5
732cc0e9be2b473265e3594b327801f1
-
SHA1
a4ecc88d39f37c59fa6a93017323fb433bf6d148
-
SHA256
2ba2c1fb25599549a7b5e310f9554e027a1729a787d41fc85a7dc46c050a5ef8
-
SHA512
cfb8539a25549768dc3b09de638b935a065506a90d024ab73a368118a028e2e02968a60b5b27fb38de52e1ee9dfdf4af429b5807ca9610675873064ec994f8ce
-
SSDEEP
6144:FAFzXCWcIeqdQZRqKLhlvKVujqNqhlvKVUqKh:KFTCWcIa13vx3+Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 1808 msedge.exe 1808 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2440 1808 msedge.exe 83 PID 1808 wrote to memory of 2440 1808 msedge.exe 83 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 4684 1808 msedge.exe 84 PID 1808 wrote to memory of 3488 1808 msedge.exe 85 PID 1808 wrote to memory of 3488 1808 msedge.exe 85 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86 PID 1808 wrote to memory of 4036 1808 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\732cc0e9be2b473265e3594b327801f1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1fe446f8,0x7fff1fe44708,0x7fff1fe447182⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,10337529947790016208,5992114887765012118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,10337529947790016208,5992114887765012118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,10337529947790016208,5992114887765012118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10337529947790016208,5992114887765012118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10337529947790016208,5992114887765012118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10337529947790016208,5992114887765012118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1344 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,10337529947790016208,5992114887765012118,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
563B
MD59cc12d2ce806287b9dbbfdbca3cbbf86
SHA1852156780813f3b6ddc059caf711b37214556aba
SHA256ac37a829933a976bc9b679bb8b9206bebbe7b9e92e0c266068fef098fd81b4f1
SHA5127cfd8154502b5ba5a2f0ebaf357bcb098d6df323a8ab5842fe0540006784dc0458cc9f9afa8fa75375bdee21d2d6bb06c02a7afda8e04eb58cba46eddcd399da
-
Filesize
5KB
MD5111bdb47a198f72bc821201dfb459510
SHA10b0ac9d8d8387cbaba0e4b4946e9a617699afc1c
SHA256d6d71bf6d79e0cd20cc4148a92fe235c744b8284e379cc8fd2933c9fe8e0d0b9
SHA51269d7eda3a9cd17fcf4b95036de74caa6db802c53d4899578f361df7ffdb2d4c782891ed8c85b70f205beb0c1b99d591e439d62f02a34d81c06e9ceb73b4caf15
-
Filesize
6KB
MD5d4ac0c521d2239e1ad14e7a048bae923
SHA143a6457b94c0f5919c2cb2a3d732ec3a354dab76
SHA256494d75f667028e7ef155f0380a7b3e72e32ddf74e3c1e045c7b15656cac9753c
SHA5124a2be24f1dcbebe57571ca5acc005048d031aec5921cf373e53d767cee9299d792fd5c2382345556fe9979ec0a47ded4131bf928a694dc310ba3d1e5a9767bb7
-
Filesize
6KB
MD57e0fb40783a05844634b0e9adcdb1d72
SHA124c37b76653f5489294a0602e78be08d01cb623e
SHA256c3341a0c1ba1cd747e73d85c35fe08dba556e2e1f2f6cc4e493957cab3fb5c8b
SHA512ca2a180821247812de7498393e6b4a0cdc22016b1bef7d6e132ba6947ed59519f2203f25418ea32708037a255dd0f80960152b7c9cfc28590bcf60e5f9c0f83e
-
Filesize
11KB
MD59416bd80518102d9e71d9027ce2dff37
SHA18a6c478daddb31859e017fc9d274eea0f6321573
SHA256b3dff0ef84788c472b59c48a8b76b7561dfb8115d9eb189cb0c25ff7008ff7c2
SHA512b23bcc5505ae371d3a781cca45dc467f371a7c273de456dc06e76c72bb2eae39b15cf6e78740be9d549c9396fefb1b68b15b1754b6a4fc11465edeeb45951f1a