Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
826266a4739ba71b005f1a0e2100892f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
826266a4739ba71b005f1a0e2100892f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
826266a4739ba71b005f1a0e2100892f_JaffaCakes118.html
-
Size
466KB
-
MD5
826266a4739ba71b005f1a0e2100892f
-
SHA1
d8632cd921554a80f92195bd31fca9ab9a5d47bc
-
SHA256
6594562f0f70577a05b203047ae2289a66655b28238680fd164c8f6ddf9fb5e7
-
SHA512
fda0a74944d44bb9fa88789be1fe9607295837ef6e8f7d0c397f1fac50c4e98eb8a19cfc3ad28b32ff1f9ac85e8636ed7f818ce989337c68e7f8e36938c2d1ba
-
SSDEEP
6144:SClsMYod+X3oI+YSMsMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+Yc:1R5d+X3Q65d+X375d+X315d+X3W
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2036 msedge.exe 2036 msedge.exe 116 msedge.exe 116 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 116 wrote to memory of 4288 116 msedge.exe msedge.exe PID 116 wrote to memory of 4288 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 4224 116 msedge.exe msedge.exe PID 116 wrote to memory of 2036 116 msedge.exe msedge.exe PID 116 wrote to memory of 2036 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe PID 116 wrote to memory of 4148 116 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\826266a4739ba71b005f1a0e2100892f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceff246f8,0x7ffceff24708,0x7ffceff247182⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3746124350679780090,2398067942016757414,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,3746124350679780090,2398067942016757414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,3746124350679780090,2398067942016757414,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3746124350679780090,2398067942016757414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3746124350679780090,2398067942016757414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3746124350679780090,2398067942016757414,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2356 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5c6cdf421bf8f8b1177b3da40425fc40a
SHA1300891b43a18e78df89dd4fa28f56b0df3486c59
SHA2564f9185aaa91a72b200b34bca2bc6da0f61f936e5fb48552b986f864e665f43ea
SHA5123d781a67ed9111cb0d705805919faafac51cc08e93da97ce3d64233f87b61c6d723229b1e2903eac1c6e3daad2e894e1c2b717648b41fe0effdce7e36ff286ff
-
Filesize
6KB
MD56e3fd48b26eaca5c50d430d5d9f568ad
SHA1656dc550235ad3b3eeb44563c2422b7f770ca283
SHA256d3c78e8404d2317a418f7a36d6b279f67fa22140918cb81a90cf7e0eacecd6b4
SHA512e88b450d29ded920b627b17e1809443357cee60fe8b036db72c129459fd49172b7a8305b8947be2a6985771df184fe5b782870be1be4b1aee8554c12061e0c58
-
Filesize
10KB
MD542d035b95c049994c03f49105be1b0d4
SHA1a9e32bb7b5f3547682e0f84133763072e66c90ce
SHA256e53a243247b02aa7edb06c5864ee0164be30cee0d42b45ab3a43596b40753d25
SHA5122e8e661b6be7657328dbd7320a532dff6ac315ef4008576012df7f4629200f716c10ce27ee95e137e0d49fd020de37f5b0ba6a20910577f8f63df41909f9de5b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e