Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
752512eb95f08040e3f20cf64fab6463_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
752512eb95f08040e3f20cf64fab6463_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
752512eb95f08040e3f20cf64fab6463_JaffaCakes118.html
-
Size
138KB
-
MD5
752512eb95f08040e3f20cf64fab6463
-
SHA1
5a8206cb47e4fe3e987d2f073fe48dacd51daeab
-
SHA256
73ce08cd57a501f7b978fc9cfcce2680787e04c4d5e3ab687aa87ac17c1e45ba
-
SHA512
fcfeb3269115ece19abd0e1279f02077b172892674cd3955e6a65d11262ef17388019a3eab71ed7d30618dd04701014065f1b56a13c2ea41ccf82288a6f1fc81
-
SSDEEP
3072:SxQjHytf5A9YXA4eyR/5FVuwsrdCEr6kfPyXmT:S6jHEbKrGksS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 1796 msedge.exe 1796 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1064 1796 msedge.exe 83 PID 1796 wrote to memory of 1064 1796 msedge.exe 83 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 3320 1796 msedge.exe 84 PID 1796 wrote to memory of 4288 1796 msedge.exe 85 PID 1796 wrote to memory of 4288 1796 msedge.exe 85 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86 PID 1796 wrote to memory of 600 1796 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\752512eb95f08040e3f20cf64fab6463_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffcca3d46f8,0x7ffcca3d4708,0x7ffcca3d47182⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,10872994418029427354,18131300368416500226,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,10872994418029427354,18131300368416500226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,10872994418029427354,18131300368416500226,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10872994418029427354,18131300368416500226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10872994418029427354,18131300368416500226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,10872994418029427354,18131300368416500226,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
266B
MD589b056240af807a1278d46f325dc5f62
SHA11e66dd4c9e030c5d2c23047a085822a372f17887
SHA256f5f9f29fbb067a58ba60bebb0f36a61c535a234e45ff52f47f192d2836bac9f7
SHA512109696dba2069f9b711948a93ebb6be8ee851336b14512c613196ca495158e8e53c3ad9bbc07aed6ea037b432f1101492a0e3c761d658f78e6e04d87b2715044
-
Filesize
5KB
MD50581c86b0a3bc28f7f9f126f7916083f
SHA11b60db326e9e9f9b07d6ed0895d17a8ece390cfe
SHA2565d80330277b6723125de25c9e9b743d0f9c8fd54505d7499de1f41a021ccda61
SHA51202e35f2cbc08001c57fe17985170439e3f4d89208a5835f3e2aa3227c119984fe3eafee0f9337c82aef842b7074bec7423344a07ab837a615b4040dc7e507320
-
Filesize
6KB
MD5fd60f4a9aaf8293da98be84efed242c9
SHA1dd75460aad1171abaf8ae69ed2a4e1cba4851b0b
SHA256d5de328b6c2c790f1567f9600e09aec8a7efecc4186f4172d7b50e172592c5e1
SHA512c116ebc31dc9246d20c935170bc144a78c5193c093fab54dbe5b30a4d66f140547708e251b2bcb2712688c0d2c60ee714405e526faeb2e19e5f0fee2d1a5a199
-
Filesize
6KB
MD5ff7afd9904354365703648aaaae60d2b
SHA1c7d0fac6a709532cc9b98deb799341f7396aae87
SHA2569c203625db49eae404847107ba5a42a41787ae24c37abf1269907fc8b8c26e73
SHA51255f0d24116bcb1d23a9c046cd1ab2c878150dabe4bc360d148a7129549fdc89746697510348f6ae7af79abab63b597a2f255ab2db0c24a92bd4104ebbd3ec2f2
-
Filesize
11KB
MD5b265deb4d2fd5df0c757c913735c5774
SHA10126ab3724283552f5fa222f8c2e47ce7372dda9
SHA256abdb7304d7f9177ac8d705a32aa36323614675fb87272a4d27031b0a02c4175b
SHA512bbde49b42b17f14c0947e0c42829a86efa885fce5629e9ebcbe18935e71d75f016120367032cb37221b7bf903009f8c38341bc00acbb126497164b5d2f8fe394