Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
84546a7924198e0839b816dabb2803e7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
84546a7924198e0839b816dabb2803e7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
84546a7924198e0839b816dabb2803e7_JaffaCakes118.html
-
Size
173KB
-
MD5
84546a7924198e0839b816dabb2803e7
-
SHA1
ecf75b381fc08a655dd20ae45faaa28a225c1573
-
SHA256
2bdf700c1188e909dc14499f827051043b14fb386fcd34553d2111ad16b783d7
-
SHA512
5f6dadc71a57da6da1d9a523707b02ae3a0efc57f751c083d5a3496a0a6bef6cd28583654bf122c10e7c9ee2c39bb3f03d1be0a6d9f7d1016aab51bf8ae00b1d
-
SSDEEP
3072:SawEOe9V1fpMXfV7gZp5oLTc+EB+7S4ZQoz3UvRCwHoLObmsJa+wlyfkMY+BES06:Szm9V1fpMXfV7gZp5oLTc+EB+7S4ZQoc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 4900 msedge.exe 4900 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4964 4900 msedge.exe 84 PID 4900 wrote to memory of 4964 4900 msedge.exe 84 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 1320 4900 msedge.exe 85 PID 4900 wrote to memory of 3956 4900 msedge.exe 86 PID 4900 wrote to memory of 3956 4900 msedge.exe 86 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87 PID 4900 wrote to memory of 3028 4900 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\84546a7924198e0839b816dabb2803e7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc451246f8,0x7ffc45124708,0x7ffc451247182⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,4037376341670298058,13010239315755309337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,4037376341670298058,13010239315755309337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,4037376341670298058,13010239315755309337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4037376341670298058,13010239315755309337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4037376341670298058,13010239315755309337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,4037376341670298058,13010239315755309337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD59121c7762e2022398fbdaa9822c16c0f
SHA1f0a11095c9bfc36ceb98d3778e516a952de32dfd
SHA2569549f57784a3cad9b64938609dd38ad427cc86ef26233657bf870e83092457b2
SHA512c91e20a949c7a1a0cd9c61afdbd0373d63686873923adb3959292efb93af8d7850f31f21db0da78e44bf824c66296a30ef03cf87f66e2c83729d9d5bcc6df7e8
-
Filesize
6KB
MD50411c5df2e70da26ee4b150bdbff7502
SHA11fbf60e760c2a817fc52d40d3524fa380e22bb95
SHA256fdb3ded712606f06c85cd2367d7edaf9d9315bedd041e8e248125d22c2d61250
SHA51275ef270f14743e4ee1bb9be9e5cc023516cb20176941bc8705dec5f1b0e17a40b2abaca98c7ed02ebf79f5c7c14822ca617dc0220bbad769f10ea91ef3e5f2a4
-
Filesize
11KB
MD58d808220c17f1bc60b55f3611f727a7b
SHA1661eb2552c3b7afbbe61ca5128e536b22d5a51d4
SHA256f6b90c332c0c9b01bc3d2fa645d7380ee0362091c58ca5bab0dadd692c6a27f7
SHA5127d15c48b05f0a2db3cde01e19d05239fdd0a5b814b855c226b0642de21e4a263860f7015a1da8332a50c0327e3b88e620dc2566da3ec0b64d2cfdc1fb9759fb4