Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
83ea1f73b801a2c6e3cd4a0cfa708ecb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83ea1f73b801a2c6e3cd4a0cfa708ecb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
83ea1f73b801a2c6e3cd4a0cfa708ecb_JaffaCakes118.html
-
Size
156KB
-
MD5
83ea1f73b801a2c6e3cd4a0cfa708ecb
-
SHA1
b0096d47e0ec7be17f4de40d155fc9702c4db0c9
-
SHA256
d15be5cb99db4f47057fbad44ff9e7433cec77297d94386fe4a951bc82103e72
-
SHA512
8eeb5e165d436b78d1d500482174bbbacfd884d0fc20ce00951ba73ee498b3ee2e7e5647552adad3e73631b3161b05dc66c1b020ec9e134d54ada4a2d8546458
-
SSDEEP
3072:BPFSF3V2UP13G4k5QhLpOatV3MJQP/fNbYaaLStRqcxWUu/v66sbsGon4G59t9VF:dU53G4k5QhL8atVtfNbYaaLStRzxWUu3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 1880 msedge.exe 1880 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 3388 1880 msedge.exe 82 PID 1880 wrote to memory of 3388 1880 msedge.exe 82 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 4728 1880 msedge.exe 83 PID 1880 wrote to memory of 2648 1880 msedge.exe 84 PID 1880 wrote to memory of 2648 1880 msedge.exe 84 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85 PID 1880 wrote to memory of 4616 1880 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\83ea1f73b801a2c6e3cd4a0cfa708ecb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff8c04046f8,0x7ff8c0404708,0x7ff8c04047182⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15907066707594599673,5168236015425338371,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,15907066707594599673,5168236015425338371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,15907066707594599673,5168236015425338371,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15907066707594599673,5168236015425338371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15907066707594599673,5168236015425338371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15907066707594599673,5168236015425338371,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1KB
MD5372896b54209af0388b49fb048a1c58d
SHA15e9651aafacf48e91f6d3ed007cd41954ab4fef5
SHA256429c3773a7261d0d7f42709f728b3143315a4a2eddbc21ab6e7a0ead74a0b9f1
SHA51206f75d84139af800c863b351da028643b75aaab62efc23d4179e24e308fe50900f80f8b7e739331354b0259c2263017d50eb160fbb2fb4ab52a9ba6dc0c5fee1
-
Filesize
5KB
MD5629fc32c70ae79bd023ec1d032a072b7
SHA1de40b53a2fc2244b5f60d2964a0891ea82e93e21
SHA2560995bad7af740df37c2ec647fcd1b3aba9307a533dd248823910eb9e0caf8e9d
SHA51224b3499025ddf644c9d083378a06b96a8fc37c26534a2598026edcb9e1e1461b79d71fc8af68a8ed50dc996dde85334eecd06f36c9c6d84ec5d5c49df2d4ba58
-
Filesize
6KB
MD5228b95051883a9cfdf393cc7133dfde1
SHA1e4af52cd3fde3500e71e5a3ce2b862e96f265c88
SHA256315fc647d0bb7d65c24eb7483ac89e93e02a0ff827c2a612624e6601e7320f17
SHA512ece175330ac39743f4b1b9b31b1082a88d82a1c155d68da5ba85f2bcbf0957c5179a4972c592363aeb4d9c4570a8d79dd0b583d6be9248692c3be96969dfb06b
-
Filesize
11KB
MD57d1e5946dee576098db2f10306d7310d
SHA164cdeff357fe2a43aa2ed6a0ee6a21e664f37093
SHA256ee6b389e2e2d50cd5703ccd1dfc7ecd5e3e8b020f099aeb67704328a83cc7e8e
SHA512d9f46226d7d46f44716d66264b76ec9ae45bc589199429b7c881651ad974d463cd467e3b2b6c39b4e07d31fe4d27fbed074dedd935f289578434aeae326404de