Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
74846cabd331dbc53ae27d7765a21778_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
74846cabd331dbc53ae27d7765a21778_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
74846cabd331dbc53ae27d7765a21778_JaffaCakes118.html
-
Size
17KB
-
MD5
74846cabd331dbc53ae27d7765a21778
-
SHA1
44f15bf40fc7c20eaaea2399fafb5ec3868d17a4
-
SHA256
8ba95799ac12577c27612441d18cc3bc7af7b804a110b8d1f751ee59c9a06a25
-
SHA512
fbf12e0d6a74a939ba62b35dd075834a98f47fe53472027fc0d400667ad741fdf1d0bf57f195e22c7394dbee4701f02fa214eba9f37e5472e290586139dfa027
-
SSDEEP
384:SIDxbk3IPmdCFRlzOcirM+rDZUlAkHXMZv3MVxgCNWpEblSCYMqiyf59j:S8xq8IrMFAk8ZvjuSWyn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 3260 msedge.exe 3260 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 2676 3260 msedge.exe 84 PID 3260 wrote to memory of 2676 3260 msedge.exe 84 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4864 3260 msedge.exe 85 PID 3260 wrote to memory of 4772 3260 msedge.exe 86 PID 3260 wrote to memory of 4772 3260 msedge.exe 86 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87 PID 3260 wrote to memory of 4512 3260 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\74846cabd331dbc53ae27d7765a21778_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3421391201293721761,10971022632705201853,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3421391201293721761,10971022632705201853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3421391201293721761,10971022632705201853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3421391201293721761,10971022632705201853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3421391201293721761,10971022632705201853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3421391201293721761,10971022632705201853,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD58737eb1ba65fd5aa7165da9b8c7f55eb
SHA10a644b69d4df0e1ec797abae369109c11869d181
SHA256eae5964283f5f19dad872426b63c8e3ae2fec5f6ed38c138f9c75fb6fad0a7d3
SHA512267fa3932c4e6e01b97aff8b4bceb622c158df447a0dd5b89edbe2a8f94a0bdae9b181b2fc803e5a45e7a4960781fd947b920923235668c2edf06710170c1c76
-
Filesize
5KB
MD504006494ef5ef0470709ca784e3d29a1
SHA1c340b2abeb02169e21e72aa574156bf6719edec0
SHA2567235dc77e6a1d375c605b16fb2bbe5f53101c4644c73ea19872f0c291d1e901e
SHA512b298233de065e97839aecd5ab705b8a85646009ff97702e03cb10a56a38da6e71d1c53f320ab834ae6f60aa7264a003bcb4b21370efedbcc4121842a47cd29bb
-
Filesize
11KB
MD5f6a755e9038f56c1e35abb3ef37b011d
SHA1e09a3024d1d5e0cc0b1a98ab26225b90cc8beb40
SHA256f0cee25ae92f50c53e0581a1ad1a34fb8f9bef4619100ec28b96af55feea5d87
SHA512399c2aaa515d797a7b39c542c2c3cb2793e38e91ee406b7f192e39d4a5acef8745d40f5a35ef115c09b98dd421f6ac69209d7edf534a5f9dca3bd6b164071abd