Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
8523f7322520e605fc1d346b67ecd3e1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8523f7322520e605fc1d346b67ecd3e1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8523f7322520e605fc1d346b67ecd3e1_JaffaCakes118.html
-
Size
217KB
-
MD5
8523f7322520e605fc1d346b67ecd3e1
-
SHA1
5e489cacd2ac1fe4571fcaf76f29e2b2eeea3a78
-
SHA256
c5d72357a092cf28f7221211570b951aa0740a528b6b7ad49be5d28ecf81284d
-
SHA512
bfd4a4ec75f3ab5d58e6a0cad2f552950e7d28f51c729394828bda236f7efd79092991bb4aab18052adc6c187f4c2e55b8edb0b063cdd9aafc8600aa44250a2a
-
SSDEEP
3072:SiFRw5spm62sv2dgyfkMY+BES09JXAnyrZalI+YQ:SiFRwSZ+ddsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 4224 msedge.exe 4224 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4224 msedge.exe 4224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4476 4224 msedge.exe 81 PID 4224 wrote to memory of 4476 4224 msedge.exe 81 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3208 4224 msedge.exe 82 PID 4224 wrote to memory of 3400 4224 msedge.exe 83 PID 4224 wrote to memory of 3400 4224 msedge.exe 83 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84 PID 4224 wrote to memory of 1228 4224 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8523f7322520e605fc1d346b67ecd3e1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16555777118746146966,13672192359567004776,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16555777118746146966,13672192359567004776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16555777118746146966,13672192359567004776,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16555777118746146966,13672192359567004776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16555777118746146966,13672192359567004776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16555777118746146966,13672192359567004776,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD534962e700fb925b3ffa20778451e21b0
SHA1581128d4feade68a7c5da35f9340cb01d482b921
SHA2566d4b749630b93985797da62be0694772cff50789208ac6a3362473432970ea3d
SHA512a63789a1728b1b6d4773a868522fd24b1592db2a3ff28e5c0e2c7217961104f4cf0e9f91a70e4f03798c264e3aa03ac7e17afd33501ab74e29e0e41c5f328b41
-
Filesize
6KB
MD534d5d4baac450fca9a02e9118b68c690
SHA100d3d4c53f2092f8bd7e6b3a67b785f0f5b179cf
SHA256689ae3f74056468e6a0d799f087b2b55a849732c6a38b7c313b7dffd389cd262
SHA51258a7a98a74a8bf4304f65ee7a348d8c55f9f28aa63e3024a4730fcde9004f1007e6857867cb8e26d8313dad203082e06507511904f7b7ac3e19d246a3fd79aa2
-
Filesize
10KB
MD5243e3287239a619fc4e763b519ce2219
SHA1baf0374d58b0604425886370d3247a114093d437
SHA25680503068e13e864edb43a2bdb686a657f38de8af4a5071df4bbb523a3eaafb33
SHA51288204fa2dc5234c7f3fa620f470fa649ee1de9251e9824f00ef9462e55d71bf297821d11a64bdc4710fbde9eeee9e6baeb396001c0fbb0eac4804c022ff675fc