Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
807f99d163a861b22172b0b23581fe5c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
807f99d163a861b22172b0b23581fe5c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
807f99d163a861b22172b0b23581fe5c_JaffaCakes118.html
-
Size
36KB
-
MD5
807f99d163a861b22172b0b23581fe5c
-
SHA1
5ab061afc9e2ac9e02d94bd9a4ec4808fcde4d9d
-
SHA256
c09e2efe2a5b5fcced5cb7daf9d0ab3fc5f9b3cb9ff0a349232c5079ffcdb18b
-
SHA512
9c865d55c5f3c334b38ffef6798a16dd07acf3536a05c851f6549cb0e06ba4ae22dc21489881f3c0f51628e79326dd5dd5b43edbae148ee2727d8f48b59e8411
-
SSDEEP
768:XLgUQN2LfGKJwCzSejakrXo+bXWSJixCmA02wamHiqsx7E/wIvouU38+OL7AxfvK:XLZQN2LfGuwCzSejakrXo+bXWSUxw0sg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 3268 msedge.exe 3268 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 3740 3268 msedge.exe 82 PID 3268 wrote to memory of 3740 3268 msedge.exe 82 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 3500 3268 msedge.exe 83 PID 3268 wrote to memory of 4436 3268 msedge.exe 84 PID 3268 wrote to memory of 4436 3268 msedge.exe 84 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85 PID 3268 wrote to memory of 1280 3268 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\807f99d163a861b22172b0b23581fe5c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb8,0x108,0x7ffad7f046f8,0x7ffad7f04708,0x7ffad7f047182⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15196864158646273308,11592515424205335716,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,15196864158646273308,11592515424205335716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,15196864158646273308,11592515424205335716,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15196864158646273308,11592515424205335716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15196864158646273308,11592515424205335716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15196864158646273308,11592515424205335716,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5ca8367c-48be-4ada-8cbb-5c1f01c199d2.tmp
Filesize6KB
MD5825547a0cf2cbaa5f3c631d6701b154e
SHA10c16afe4c7ae4e00213a8bbbdaee614ce0efb0a7
SHA2561d3fdf6a1720048ce272fa50dad24e6943f3d63c09ea8d820fa360fee9b0e28d
SHA5129d8454f06107774600247dddbeccd958f8bdff2be69d55e83023e7573aa414f482962c99301544385d949db079549768697a6ec6ba20d7dbf1062c6d93f64d41
-
Filesize
766B
MD568b1909e6b5e4b81d8e60b1efef0307a
SHA1a64bf4c21adb107b8581e965a2a7fc7800b4f390
SHA256a1cdb0ccc547c24600180a3be7fc416afc6c9e5584403dde55235c90c197f28d
SHA512610e1fe39e716c57737437d116ba275c7f2a5c51920614f291382731bac2b3f00ac415248ebc0995c2d3b5f0bde70d9063d1c6ee633838f27cf2f962acd5a2d3
-
Filesize
5KB
MD5ba8de314800cb8f66a11a20524492043
SHA16e0ab73db260723bface8020c893177d65887dc9
SHA25624ec7462db2e78980614a0a39c228f2f8c1bec2c2325ace3e762944bea6cd781
SHA512be5422c100cce15b8e2267b34f535a6fb69cb49a719b99666c5ed870c264e09eb75cf5c3a2be2148d71d14961d17402e8596d7b52c268f206f66cff3148240b0
-
Filesize
6KB
MD5d15b30dd7824c36139ca1b84ab94b223
SHA1bc177f75ddc78fe257d8fc17467dee5482c6bdbd
SHA256c02524283a9ad66ca7bc09a2ef712220148292977a65bb923d07722d08ce5c1a
SHA512d7fb805c033f63a998a1d261ba5e01ec0df32094c1f2219269a8157c8d5b4461c6c91eb93fba80cfa756693bfd217963e41425a5755691c1f97fc72703dfe525
-
Filesize
10KB
MD57f465e37f4de06da4e08f87a535250c8
SHA195ce262fecec12d5ccc3227a9513d5e426418098
SHA256a8c633e039c9eb99e06ce6346fe685a1442a5873aa3068221a15baa4b07886ff
SHA512c50127b9e6cfc103984eb06b672ad5eaa94d12e166a064ee6063c0c6ca22d21554604692372161a18bca8812e2f251c4867d02ef328f74eff133c758b6d2fab6