Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
88736705092432364d9c0d2fc08debfb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
88736705092432364d9c0d2fc08debfb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
88736705092432364d9c0d2fc08debfb_JaffaCakes118.html
-
Size
138KB
-
MD5
88736705092432364d9c0d2fc08debfb
-
SHA1
6db9dd3d9ef729120607d6943d44d5da65883263
-
SHA256
b253ec7e66364965cdca3fd0dc0c7eed38a40ff0e691ee98cbaf0784ae2c678b
-
SHA512
519ce6ceff089d97dbd2fa49c2b54261041bd13a2f935e71fd2f20e775db4ce2e0b2c89328f107a52942592fa10103f1b8ea4df5e38ee5cb018fcfcf94fb6f8c
-
SSDEEP
1536:SIjyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsS:SIjyfkMY+BES09JXAnyrZalI+YJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 228 msedge.exe 228 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 228 msedge.exe 228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 1612 228 msedge.exe 83 PID 228 wrote to memory of 1612 228 msedge.exe 83 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3056 228 msedge.exe 84 PID 228 wrote to memory of 3780 228 msedge.exe 85 PID 228 wrote to memory of 3780 228 msedge.exe 85 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86 PID 228 wrote to memory of 4024 228 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88736705092432364d9c0d2fc08debfb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11441564792137562320,11354467651175584654,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,11441564792137562320,11354467651175584654,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,11441564792137562320,11354467651175584654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11441564792137562320,11354467651175584654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11441564792137562320,11354467651175584654,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11441564792137562320,11354467651175584654,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD534b859e16b448013769f15276878ceb2
SHA1a82a3ed39cd26062096e63bf4c45238219a7076e
SHA256d60c2612d80a234b3ddeeb8e0513fa8f2647ea3a7077427d641180ac546261f1
SHA512b66706461f6f271f98aa2c3967897d03521ef74ba02bf74cb704bf832a55c65f95bbe69a8d5149a9d0bfa8e3696a7e101b3827d92df0841bd0204d27ecb3ec4b
-
Filesize
6KB
MD5d2a345ab2b7e47ea0d24fba30d6851a6
SHA19fc1059c0e79b8d2f3b10dbd88b23824c0e03fd7
SHA2564be8d7428d1e93b5b13e0ada2160745476a7ecba155cb6467933f079d3efaaf1
SHA5121ed48536066e76487298293614951715f262dd72459f1d37583a6072c83adada661e5f2b4adc5e6dc13d44cd6eb76f901f83806a5c76f8b0bd69265d1725c77d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ddd57382-8bfb-448c-9984-6c8b5696e8bb.tmp
Filesize6KB
MD501e24e9d66104581709963ffc44ab480
SHA1b2995bf666996a030fd5804911c23c629a6d65f8
SHA256411049343d570432331e219deadbe9d5b4e139b00b6b8c3f15ab59924772eac7
SHA512e2c65149cb8e517bd41d668ef0a26a7b1b7a5a0e2e589a663f5a53b44267f98e4ecfd0f69c26fc75139e10986f61440120b79605a0886907d75f3e4a1f73bdf5
-
Filesize
11KB
MD50068294f2b8bb335379ab8e327ae6939
SHA1a34ee15f05fef3a0216799960dcdbcff67bb226d
SHA25616007536a12e0c6f9a1fe4a04578abb560e6dac0f8aa5e4d3da782b0b9763a95
SHA512bc96c1ffb7180903ca392ea2df4ab6fa0ff262dc80b2e777ef96831430eaf8104a5a130a11431de22bce29b61946f7ae9c0c28e87060a355e125024bc46645a4