Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
811715779a564ff051b7470b6f6e1f5b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
811715779a564ff051b7470b6f6e1f5b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
811715779a564ff051b7470b6f6e1f5b_JaffaCakes118.html
-
Size
240KB
-
MD5
811715779a564ff051b7470b6f6e1f5b
-
SHA1
15e29790e9eca525cbbfb585b5feb12d05dfd72b
-
SHA256
23329671ec71c5c42e9a0d4c641359452afeded9b2fc35fca1724dffcba268fd
-
SHA512
c4ac1e2fcd551b9ca329f5b0624bf496c5e8013a96f02182283e8cd8a6b6027b3adbcf42522620e0342488c3bdfe0a72af2f12849dafd56a337fa8aca52f4f32
-
SSDEEP
3072:dKi3a7PxkKmO8MP63vkxEyUtCuFP+7FEjfQV5b3w+s/6LqimUkI0C+o7:dj3KZkIPW8xEyUtCu0i0/gsLqiP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3552 msedge.exe 3552 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 2028 3552 msedge.exe 82 PID 3552 wrote to memory of 2028 3552 msedge.exe 82 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 2592 3552 msedge.exe 83 PID 3552 wrote to memory of 3648 3552 msedge.exe 84 PID 3552 wrote to memory of 3648 3552 msedge.exe 84 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85 PID 3552 wrote to memory of 1156 3552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\811715779a564ff051b7470b6f6e1f5b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,5857670655452944649,7090507299487710160,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,5857670655452944649,7090507299487710160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,5857670655452944649,7090507299487710160,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5857670655452944649,7090507299487710160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,5857670655452944649,7090507299487710160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,5857670655452944649,7090507299487710160,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
1KB
MD5320b8a2d62d34626290898c569226c2c
SHA1a22ae88f347ecf8f328ed8141010951780619d81
SHA2567fffdab9ed654575e172110956061900deef4feafbb1ef6e3fdb213b626e82c1
SHA5123b28e42ee6931022f677195314e3274d3988ab1a62a66de1927afebb912cbee7e7ca1e62a370634378208408c1f56a98f7b829c4fce26452256b351f5d46a72d
-
Filesize
1KB
MD5f4b9b7fc51315e80ffaa07cf8322ad72
SHA10484331688e452d7d41a292150d773d244b1fdd2
SHA256878ec407bcd4d337f868a794e2463fb7cb8c7c2935ec0a7266610dc23c1ccbab
SHA512895280f2d8994466797513a87a44c316a5a7793cb5fbd2e02b9b6ee5a99bae2f181333abafcd1927a4d0386c19ee80abcce51ded45cd95cede41e05535795a99
-
Filesize
5KB
MD5f062f7a4b5a8380ab2c5124bb4e84993
SHA1c6acf65f5f2fd690d1111ab7b95fb816836de401
SHA256a04c3e5174ceab5fadf0291993f62db2c5762f6a02910f577ce4f225303d53ea
SHA51299b3a8b80799cf4256e4c858f937cc4f4907e3ef78dd671d132ac9abdfd8869a571e6467e6d900fa8828c42269856ab3ebd029f7e44f163bf36530d4c9f48642
-
Filesize
6KB
MD52728ea8d2d02c641fcc0e86112416dc1
SHA16d4920b65ba2f313de12f4be7ca587c714c68793
SHA256e2ec535102569a8adf03819fa174bb7a856956eed0b487db6c72f4de15139038
SHA512f95c8bd0ef4d58e5de8660a10708df477e59f124b247cc1340a18af920d1f94270d822436bc5a99b436e74a5924806b79ec9d1ec9fef63b349744d24a3d8159d
-
Filesize
10KB
MD5dc9ba8211dba4a9a494b68b03319aae6
SHA1a5f5f116219a2430e7a5a225ef487ed0339792cf
SHA2569caf63cff15480d0409e7b4b929bdeb08a83cab72b1e19db29ff0d12dc1b6112
SHA5121047259fbde97249db60aa3f54b09ee13e9e51e5d6f29dceac707655defd045fe0ef00d3bb2ff4f099dbdf04e9e46f46f502129985243901c29d55ff9fcae5e8