Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
803c7e56cc209bc1ab467cf292a1e35e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
803c7e56cc209bc1ab467cf292a1e35e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
803c7e56cc209bc1ab467cf292a1e35e_JaffaCakes118.html
-
Size
139KB
-
MD5
803c7e56cc209bc1ab467cf292a1e35e
-
SHA1
a7882b68dfe692e6fd43b3d66d1423f8a9af26dc
-
SHA256
e573824532783fa847fa53d072bf39ac639b108f6913b0c6d7f5c54bd1a98d90
-
SHA512
b707643cfa074167325f22782477f003c8f6b9aa40c70cb3c287d6416beb750aee9908f0473661b930c65ea1b4f9c983924a9c684061948b2cac1844e41c8669
-
SSDEEP
1536:S9NxNJpTEh7RlKB8syLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:S9hnOyqsyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 4644 msedge.exe 4644 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3444 4644 msedge.exe 84 PID 4644 wrote to memory of 3444 4644 msedge.exe 84 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 2980 4644 msedge.exe 85 PID 4644 wrote to memory of 3336 4644 msedge.exe 86 PID 4644 wrote to memory of 3336 4644 msedge.exe 86 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87 PID 4644 wrote to memory of 2044 4644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\803c7e56cc209bc1ab467cf292a1e35e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa292946f8,0x7ffa29294708,0x7ffa292947182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2444268053341447094,8092433065812341885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,2444268053341447094,8092433065812341885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,2444268053341447094,8092433065812341885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2444268053341447094,8092433065812341885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2444268053341447094,8092433065812341885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2444268053341447094,8092433065812341885,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD520ac19f670f4813818b03f17f5a91e15
SHA19292b87617a7cd0d905db7b302720471f4e89dde
SHA256b618df75ad756a093b63ea6a92b2ab69efb8edbd97269ff13d2b1a28db39747e
SHA512be2d48453e66fee59636f17ffaa6de265a5669585004fe7060e7bae4c1bfd29f870df86e5a8314d3c8b7762c6c6fc474f5f63de8af972314139bffb1e67136e2
-
Filesize
6KB
MD5ef612df16a53d11533ccc5a1e5b441a1
SHA1be29323c96c18aab06ea69c80c5aac03437ade4d
SHA256a28946b25a3dd500a437230832fd39dac029668fc5de2f45ed95b0f311c79c5b
SHA512b95da5b32f5c634139dfb7dbbc76fa577a75cad8389565417ec6a7ff08ea044371718ce070f760e285af7c92c15b91cce3d431c8c37b3f874391e7d76e6a1f7b
-
Filesize
11KB
MD51f169972d3f201a4a09e4b2d2720c072
SHA1e84ddaeb1b3a097f136bbd6b869068ce439af6f5
SHA25657942de1499664404cfee8486369177063c867f1794d12be99ea9532f8c92946
SHA5123e360e957a9f75fdd9a09d1fc1da11da546e64de2790b0d99fbb4dcd9e46a70a6c46709b4d26057f364a905dfe0d8815ef2e1c47019247f611bce119cf7505d5