Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 04:27
Static task
static1
Behavioral task
behavioral1
Sample
85f86317f8de163a3275455ca03530fa_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
85f86317f8de163a3275455ca03530fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
85f86317f8de163a3275455ca03530fa_JaffaCakes118.html
-
Size
214KB
-
MD5
85f86317f8de163a3275455ca03530fa
-
SHA1
aba7549e72594489f78015cb59eb39d85384282b
-
SHA256
e87270fcc1014d720524e6de3e42139c50adb43a8adab16571f4fa95b849570d
-
SHA512
185e5da250df2c3a7de024da8723304f920596230bbeda63fbf9df7bda982f9e58faa19bc542b26328d0aa8eb767552ad9b994031cf72d92f26450db426dbac8
-
SSDEEP
3072:2rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJYL:uz9VxLY7iAVLTBQJlY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2460 msedge.exe 2460 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3084 2460 msedge.exe 82 PID 2460 wrote to memory of 3084 2460 msedge.exe 82 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 1564 2460 msedge.exe 83 PID 2460 wrote to memory of 2556 2460 msedge.exe 84 PID 2460 wrote to memory of 2556 2460 msedge.exe 84 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85 PID 2460 wrote to memory of 4708 2460 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\85f86317f8de163a3275455ca03530fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8699846f8,0x7ff869984708,0x7ff8699847182⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,547409402972091601,11621102662723582597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,547409402972091601,11621102662723582597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,547409402972091601,11621102662723582597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,547409402972091601,11621102662723582597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,547409402972091601,11621102662723582597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,547409402972091601,11621102662723582597,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5399dd7af3ebf03646e558ac8f7e708da
SHA12dc58c487d6e45ac88403f9ab207837971e6e3fa
SHA2565d517dd1f2c38aa4ea6810331e29463c6158f24ee66d6958c480794d5ae98b09
SHA5128b9ab1d33fbaf64f134dafdf0135e0d134092ffacfa75dcdcd893e1714056666ce0a600c4e76ae761257c6e336f05e8cad845d2df93c9094b285c7e163251795
-
Filesize
6KB
MD5164c13c5c2eecf08b4fd3cb0f9110df1
SHA1c0e24ffcdcffe60146b0ff3ab3e2153f64955bd1
SHA256727609693c995687a34b53ef228ed4eb7ea707ffc1b0910abc25a5d605a892d3
SHA5126b747093de98adf7ae553c6c895e1faa0d978dd414aa376b187610d0295594f0a26b9364f83c99f11a63129703f6c3920362116a920aaea3b9fcd064ae56f7fc
-
Filesize
6KB
MD528f80c95ff8dd51fcaf87e6e7bc98f0c
SHA14ad64dc506b86fa87b89824f296dc5ad08b91a27
SHA2560a7384c1f03d8d5abd974056551ec9a6d522981eb766f17b80b51d0c4338a436
SHA512ea9a0e6f144ad56fced81567b972f6382ba8e41da2cdf30ba56e695dee90bd41eeba0e67b0b4e7a9be5c27ea4eca8048393376b8bd6de7bc6dbab74729c92eb9
-
Filesize
10KB
MD52597905b4fb6095e39390882f7a20637
SHA1c48a16b78fea9f8e6a73c07048760adb69645ddd
SHA2564e0bf4baa861fabfd9846491a96556ebad32916441d59ff9a45be5a521d163fa
SHA512c285cf49ad3d071fd704cb81e8b089e07d3f4c2a5488eb105926b719bddd161c1e13efa3f65220fea8e411d3f61dd6464db1a2ea0e8ca170711ca714ab2bef4b