Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
83abe34f4f7c7ba1bfecc8eb6f43eb8a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83abe34f4f7c7ba1bfecc8eb6f43eb8a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
83abe34f4f7c7ba1bfecc8eb6f43eb8a_JaffaCakes118.html
-
Size
218KB
-
MD5
83abe34f4f7c7ba1bfecc8eb6f43eb8a
-
SHA1
5a98244284617628d01f120b7258e959efe5c925
-
SHA256
78680c143335a0cf09848e3f507975c0dd90f63064b0f28c28669ca118b59ed3
-
SHA512
2406ce705a7cfb5699a21c2d61d924b722400e94431ebbf96dbed4bd24a647d52fcd9ecd43d0b89bf859fba709d28e46422662dc7da5686642156c10ba9002e1
-
SSDEEP
3072:ZMwFmWj6QlPyfkMY+BES09JXAnyrZalI+YQ:WwPjNlasMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 2592 msedge.exe 2592 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 3092 2592 msedge.exe 83 PID 2592 wrote to memory of 3092 2592 msedge.exe 83 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3188 2592 msedge.exe 84 PID 2592 wrote to memory of 3248 2592 msedge.exe 85 PID 2592 wrote to memory of 3248 2592 msedge.exe 85 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86 PID 2592 wrote to memory of 1728 2592 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\83abe34f4f7c7ba1bfecc8eb6f43eb8a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8030d46f8,0x7ff8030d4708,0x7ff8030d47182⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,15455392008980957061,16552650725924518648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1464 /prefetch:22⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,15455392008980957061,16552650725924518648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,15455392008980957061,16552650725924518648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,15455392008980957061,16552650725924518648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,15455392008980957061,16552650725924518648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,15455392008980957061,16552650725924518648,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
266B
MD589b056240af807a1278d46f325dc5f62
SHA11e66dd4c9e030c5d2c23047a085822a372f17887
SHA256f5f9f29fbb067a58ba60bebb0f36a61c535a234e45ff52f47f192d2836bac9f7
SHA512109696dba2069f9b711948a93ebb6be8ee851336b14512c613196ca495158e8e53c3ad9bbc07aed6ea037b432f1101492a0e3c761d658f78e6e04d87b2715044
-
Filesize
5KB
MD5b8362d5293c99656f1a7f746201a447a
SHA1eb2c5b34d108b2186a75a5070f415c13436193b7
SHA2565f67b739c52aff9ff87856bdf312ae5b0e474612905dd08962031fb0de6be98c
SHA512a093df1f5cd0ceb5c249e07565d2ff5cce86d3fcf8f6d492b37c8b8480825aecf89f641731d828d40fbf2141bd0edb059609b44c36cafe9b29ad0bf917ae3917
-
Filesize
6KB
MD5266d7d811a6a3e2a71eb3bc23b702592
SHA1e0d61091656eeac441901bab2e9e2beac3121cfd
SHA256c50c570e9df55dd7488d5d52ee7d8bfa94783dc0e5cae7b2abb1950cdceede76
SHA512b08d56e230c6d96d4fb6c46413ea44a054b9f72830e34f92a466a41426e771cb0e7fc57fb6b8f1e982b5dd46147c29e2433d0c907eab4df67e634f4ccaf2cd55
-
Filesize
11KB
MD5b973510b9926472a7ccbde63518d0c5d
SHA1369119101283a567463e3588e30db661fa003093
SHA256faebefcb7e0136b6ae319b30a1e093a73558e69ff69db1ac262af072562ccbdd
SHA512a25abd28b71b40c03b8db13d700330b575f28c549b88d9d3916505b0a71332b09c52219b4a79cb68d7137c57435835f18df1ef3dd3f1259a0ca3d669a64af4e2