Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
875803ff2df26ed48b26e6cf05ab16bd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
875803ff2df26ed48b26e6cf05ab16bd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
875803ff2df26ed48b26e6cf05ab16bd_JaffaCakes118.html
-
Size
139KB
-
MD5
875803ff2df26ed48b26e6cf05ab16bd
-
SHA1
83327b01b5e3501d3b1186b649374a965ccd0294
-
SHA256
5b6df261aaef606ac5a4c4fbb4af7d7f903b23af3ae18767957c09deeeef43cc
-
SHA512
1b375a53d1b6bc96b709539f5a6c91a3f06fb3f8d904220d59f18844cd7d7faf2693333aa245828b6f08d69c626f0d8fc2a493042ed99c14aef14724169b9439
-
SSDEEP
1536:SDtFIH9lUfcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SDwGcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 4880 msedge.exe 4880 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 1316 4880 msedge.exe 85 PID 4880 wrote to memory of 1316 4880 msedge.exe 85 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 2536 4880 msedge.exe 86 PID 4880 wrote to memory of 5116 4880 msedge.exe 87 PID 4880 wrote to memory of 5116 4880 msedge.exe 87 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88 PID 4880 wrote to memory of 2996 4880 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\875803ff2df26ed48b26e6cf05ab16bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,13974829794984232604,5376448680209621017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,13974829794984232604,5376448680209621017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,13974829794984232604,5376448680209621017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13974829794984232604,5376448680209621017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13974829794984232604,5376448680209621017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,13974829794984232604,5376448680209621017,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5061afbc8d2facf262af6664da86e41c7
SHA1941731a6a2cb9ca08ff6f7c686b4d846cf3c538a
SHA256631e4232cd85065e95ecabecfafe908c50b6bcaad6801a3770a81c6c3f76a329
SHA512528848f8373c7dff27c1d0272c5eef1e1535a194796ea747a70eb36b34b686f8afc5ccd25e89eaa98996f262eae0dc6201c7c287c431bdf49069b1c9b4de7148
-
Filesize
6KB
MD55c2c1999c8bbef833aa015fc38e64616
SHA13ba34d12ec13c7fcc8b2bea5dea69c12692c59c4
SHA25607d4c417fa971b54e51cbba054d0d6438c2ccc77daad3ee8a6c72236a9c5e9b1
SHA512c739acd393a03fef7ef76243863334a2abdb7d5971f2095ba13c77dc176142561902129a01c73a2231761d7baac984ca14c0e1b1e1aa0f27157a11886889cc1a
-
Filesize
11KB
MD597ff0d44aa62da80cd18f4aeed0ad1b6
SHA1488e220c136b245c2eb3a04c24aaa0fd42ebb8da
SHA25635a2911876d8d1a6bb3f09cdf50a00fe081d3ba4d22867525b55ff5fd55ef37c
SHA512e6d66416701ac68548c8096f9b53426a36e7d724507966dc73685887bb7a8b41035430af9168f4a9adc6fab667994c381643c4baecb6afb7f3cea1713ef331ea