Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 00:19
Static task
static1
Behavioral task
behavioral1
Sample
774a391f5e7f282e1909c47e6c5e2c1c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
774a391f5e7f282e1909c47e6c5e2c1c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
774a391f5e7f282e1909c47e6c5e2c1c_JaffaCakes118.html
-
Size
139KB
-
MD5
774a391f5e7f282e1909c47e6c5e2c1c
-
SHA1
dca953d009e60f364fc96e4a3696b39f21c31bd5
-
SHA256
e6eeda4f33e5f151350d1b80ec224fc023b6d3ecfdbe27ca4ae15e51603138bb
-
SHA512
3c54fedddedd9290a1c41b268d2d246b8cc9d3a4b61c4aad9b9e257b02f0a1c74d3ae9ab66448a76b60676fcdb727341e07d5dc7c38b1a098d730d73d1f03079
-
SSDEEP
1536:SEBNwrHjOGE0l8yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SEBEcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3944 msedge.exe 3944 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2412 3944 msedge.exe 83 PID 3944 wrote to memory of 2412 3944 msedge.exe 83 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 1248 3944 msedge.exe 84 PID 3944 wrote to memory of 3964 3944 msedge.exe 85 PID 3944 wrote to memory of 3964 3944 msedge.exe 85 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86 PID 3944 wrote to memory of 1020 3944 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\774a391f5e7f282e1909c47e6c5e2c1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1e7f46f8,0x7ffa1e7f4708,0x7ffa1e7f47182⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10158517276528605656,12012218769955711500,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,10158517276528605656,12012218769955711500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,10158517276528605656,12012218769955711500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10158517276528605656,12012218769955711500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10158517276528605656,12012218769955711500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10158517276528605656,12012218769955711500,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8e4f6d3d-1ef7-41e8-b839-b1527d7428a8.tmp
Filesize6KB
MD5fc8c1a6e11381358ae76f5e3227e86a2
SHA1cee5a4d478c19d8356dc76f7e3f3bdb2791fe72b
SHA256e9e47b0d4b4ef15c280986f72e3754be9c4ade6e81b50e0b9dd0f790b9f5be14
SHA5126dc721256a4850950ca558aed2a8e5f8d281b3a133a8209e3428f1b34901931d894ee0d9cf0fcaccc6b2e3eae6837f2ea5639b31cabfe3ae838f47748bbaf6b1
-
Filesize
5KB
MD50e98cb05f9b6eba2b58f5bae2ab897d2
SHA18c9a13e33872068a0acf8120a35b6e8bf2b7fe11
SHA256e697288e9e123e43349d9c9bff09a3c96f6d793e0f9e2e7b4569a59bc29881eb
SHA5125d4374a83673eea3add348760a0c67dd11a0275684c46e324b86de6eefce66b053132b76e0fa664780fcb4df36e84ca5bbffc551d826df2dcd32ea80c839a655
-
Filesize
11KB
MD5eb73ec476955bf5b3b0ef56dd4d3be4b
SHA155f303d0cecef55a33fe87c2d16e3f2b025db6d2
SHA2568e0161ad1bc8243fcb18c9075cd192e85cb7fbeacc85974d6e83c114c4308a2c
SHA5121e0b0aee2b98750cfe181cb1213216a6266da1ae56b5e883df4474de849d0559e24bf2c49f8a1aa7a9cf8bdcb8f409a99f4b2c7237aac8719501072757811156