Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
866c861ca5a57c604353f4bb4ea23c83_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
866c861ca5a57c604353f4bb4ea23c83_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
866c861ca5a57c604353f4bb4ea23c83_JaffaCakes118.html
-
Size
32KB
-
MD5
866c861ca5a57c604353f4bb4ea23c83
-
SHA1
e98a8ffef02f2c395413ecad3678508c466ec92a
-
SHA256
216d5e743a9a9b473114d3a1e88276c85400fe3192fc27ac70cbab25e03925aa
-
SHA512
505fa46258fa539c01048f87078bd9c4ed21b6a67fda4266d83d3f2b5185c2fb13194b08f909cba3a5359ad00c6adb95364b798aa5302a76cdc1d391eed97100
-
SSDEEP
768:q8FUOIGQkANoXbL3wDWbCPt8XwfcsWia3Iid4JH3/:uORQkANoXbL38WbCPt8X/Ie4JH3/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 4596 msedge.exe 4596 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 4740 4596 msedge.exe 84 PID 4596 wrote to memory of 4740 4596 msedge.exe 84 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3408 4596 msedge.exe 85 PID 4596 wrote to memory of 3620 4596 msedge.exe 86 PID 4596 wrote to memory of 3620 4596 msedge.exe 86 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87 PID 4596 wrote to memory of 3984 4596 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\866c861ca5a57c604353f4bb4ea23c83_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa597347182⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,14654446578186123215,16661117621817095484,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,14654446578186123215,16661117621817095484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,14654446578186123215,16661117621817095484,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14654446578186123215,16661117621817095484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14654446578186123215,16661117621817095484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,14654446578186123215,16661117621817095484,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
1KB
MD577af532aebe0be51379836a7aba3afb0
SHA1b8ad71b43cd17bfcb40556a37b28988bae259b9a
SHA256c9a89221c13b01ff9dcea8de8235b1b88ccdc8bee68d71f12633375b1ae6f1b6
SHA5122852f3974709cc2cd09d06deda9428379d21a457f3046361a8dfd44169762588bcf8378147359601e4624258df6190eb5115966c83aaf2c29b2f3f906b71190a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD59eba5893c20e13bdb60c514da797ed28
SHA17971a381f6fad3ef2446474ae323252dae944977
SHA256350d2aeed9f38cea0f318b08471cfe1f8af78e298ea37e99e507a752f1cda89a
SHA51284f9c37a8b86329a335765087ead1de11fbe2d1b36e332fe6e04823c891a93fc5538e5cd5761e34770063bd70d52aad2e76584e431baae210c6470d1989861ab
-
Filesize
6KB
MD589817e6edbe0f139b6974baaa2834579
SHA148b1b07a6f1b3a1563b64e7c99b707e230a19727
SHA2564774aeafc2aa2d9e1f21fa5a867b40ff0c9a0fa12ddb3270ab243b9119c4cc59
SHA51240401c12df38073c7f748e5edc7d93b74fb8884480a9c9f70d40d47fef5a9cf158d872360e2169ebac3bcbb424e63bc02e886a6c334a04ba73aabbfcb48cbcf4
-
Filesize
10KB
MD536acfa0c0caec4812efb4721ce881ab3
SHA15d112c36acd641e8abac6141968720cd85667ad7
SHA256459fbc5a0ed48724636b3b607ee044809cf89831ae5ae043f2fbbc30a37633ee
SHA5122dcbe5bf5c717c76e088b34e7615e77629e93d975f74541b2b75ef5410d3c2ad1542c58822a2ad89ed68660193103a4c189876b09bb6a959dd60bb2ff2893c84