Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
897d3c8798debfc55b0f4266b1777371_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
897d3c8798debfc55b0f4266b1777371_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
897d3c8798debfc55b0f4266b1777371_JaffaCakes118.html
-
Size
176KB
-
MD5
897d3c8798debfc55b0f4266b1777371
-
SHA1
78f5c98eecf74e9d9c332c6da6c7b88af122a1d2
-
SHA256
dac47109b1d5caef4a850178a4469ffbc8683581d3f1fe11bfb9c4f925bb9089
-
SHA512
c9381b366b8a06bf75c3a56b914ad326948417b1400127c434bb9550d68fb28b904d981a4229b81570eb31c82268e40f118ae3a892a68f68f9cc84cb1c91ddc1
-
SSDEEP
3072:SWOJyQxDmYnQe9L3y0zkF4IbkEThl4wG4o+Bmw8J41h/Mfnl8LdDezIyfkMY+BEu:SdyQxDmYnQe9L3y0zkF4IbkEThl4wG4u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 1220 msedge.exe 1220 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1924 1220 msedge.exe 83 PID 1220 wrote to memory of 1924 1220 msedge.exe 83 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 1104 1220 msedge.exe 84 PID 1220 wrote to memory of 4688 1220 msedge.exe 85 PID 1220 wrote to memory of 4688 1220 msedge.exe 85 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86 PID 1220 wrote to memory of 5004 1220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\897d3c8798debfc55b0f4266b1777371_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82fd46f8,0x7ffa82fd4708,0x7ffa82fd47182⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,16576219050677752527,8927027610024545386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,16576219050677752527,8927027610024545386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,16576219050677752527,8927027610024545386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16576219050677752527,8927027610024545386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16576219050677752527,8927027610024545386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,16576219050677752527,8927027610024545386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5852b558d0794fbbfb3f9f04476c90602
SHA1c3644240992e3f41dfedb9178d73ebc8f909faa7
SHA256d28cbe82a67b69690edd6fb63e5d266f25aaabc10282a8ad88fe690eaab97ae1
SHA512367af128abab85999b3fa079aaa45678171ab0a8ef2e43a400bbb781db172a63f6dd25e5f7b177684638fcd9b38f180b00dba0cd2f7f00b15f2287079293c761
-
Filesize
6KB
MD54fb524974964d39ac8d97b7d2021e00d
SHA127dd2505950a4cd9e529ab2491990114ab241aed
SHA2562d8a66437f595cfa458dc40f7ce7157a390729c269970c281097f0bbf1a88ea6
SHA51241459e351fba9bf26a796f57aba40b95958958b20dcb863f4542d1e302e67fb623b956956f782007fa529d84a4f7680366d7be54fe6c0cc16f6bba953bfa9a64
-
Filesize
11KB
MD5f6954a1eef4e78cedcfd253b52bb1cf7
SHA1ce407421baf94f5eb367a1583eaf0e7477f54ba9
SHA2564e75e1f4c3cc9a66ff8d62005968161eff9079fcf429e1312d2bda7347a4a8b7
SHA51228a5fa8a6ecbda364d45ee4b21769473169d63d4b2b488ec6ac5e233c2199c4c737a4adc3007434e2130afdec6dcaca5102d776d21bb7a9a734d5aacebe93455