Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
80eb2ec4b66db6b30ba4cf8e0051ddfa_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
80eb2ec4b66db6b30ba4cf8e0051ddfa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
80eb2ec4b66db6b30ba4cf8e0051ddfa_JaffaCakes118.html
-
Size
18KB
-
MD5
80eb2ec4b66db6b30ba4cf8e0051ddfa
-
SHA1
50eaab5c93f5a837ecf4130b5170eb1d39860281
-
SHA256
b8faf0fb547126c5f9121d65509ef8280ccc130ffc2a91f7643cb49819ef349e
-
SHA512
02b9a03c5704bfbc6b3c9c4002a96d233644ba9abc6469ff934322ca030a67cd4a35df887405492509e8403c6c8db09ed1915938f7f7a36a05e7603d03614361
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIz4pzUnjBh7d82qDB8:SIMd0I5nvH1sv7GxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 3440 msedge.exe 3440 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3472 3440 msedge.exe 82 PID 3440 wrote to memory of 3472 3440 msedge.exe 82 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 2840 3440 msedge.exe 83 PID 3440 wrote to memory of 4392 3440 msedge.exe 84 PID 3440 wrote to memory of 4392 3440 msedge.exe 84 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85 PID 3440 wrote to memory of 3248 3440 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\80eb2ec4b66db6b30ba4cf8e0051ddfa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda88e46f8,0x7ffda88e4708,0x7ffda88e47182⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,4859802966030537921,1316174017314223184,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,4859802966030537921,1316174017314223184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,4859802966030537921,1316174017314223184,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,4859802966030537921,1316174017314223184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,4859802966030537921,1316174017314223184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,4859802966030537921,1316174017314223184,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5bb992788f5d744867d8852c571f10f9a
SHA170cdd2c56d390a2d503420793ecff7064cc7fcdb
SHA25646c0104b84352b9ab067a0fc68f0701de2b2c4b326225cb76283d0d68494a41d
SHA512db7a7621c45e05e7a1ae9443c8f619306bb6c85882fdd6170b1aeb927762d3bda9fc21bdffa0644d922ce4223a564bd643186b558f3ffccaeded78d3860d082a
-
Filesize
6KB
MD5f72d4ac660b550cd12680519c9ae4f99
SHA13dc14e2505d9fa967f1ecfb37f121165fd97495a
SHA25648485d87981d4ddcb87bf53d778d5bc39598b9c45a1c63936523f7fd81504df5
SHA512b71463cbd7dec76cae572a4e5d5a8a4648e00d9a80755454c8dff6abb33fdf895f922970563cd9f1fa4e8011d1ead2055189dbe5dcf1a119a4dccae7682e7ca7
-
Filesize
6KB
MD5d6659f201c5125f1ee38fb0c72386279
SHA1f3cd5ccc054532c0921d82e0bcf58377efb088bc
SHA256c4eed38808765b8b9c9c913ea3d530518472f7c0daf8ea2d3c71c927164dd56c
SHA512e6e6128548745664cef1eb2151c64d1f31efe52faa1094b8e9b5595c29568a6ed297ad6ea8f80de5826caf1dd91373d3ea31cb84a6064a7152a60f9b2443d5f1
-
Filesize
10KB
MD52d259a7c49a9af4eba352d4dc4388ff4
SHA120487b36745d3c41b56b62899faee8d402682697
SHA256e464299735c1b22d65be238db82a7fcddf32db1c232e689fe9801427d4f4f26b
SHA5125c97c825cdc67d0267a969a2b04e7d206dd014a5d559928b960f36901cb54e8b44299df47a0b8ad748fe6c58186d880c3cd9be9e23dc6b142237480400069c55