Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
92cb8b36b1043823a42e9e6843ec3856_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
92cb8b36b1043823a42e9e6843ec3856_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
92cb8b36b1043823a42e9e6843ec3856_JaffaCakes118.html
-
Size
139KB
-
MD5
92cb8b36b1043823a42e9e6843ec3856
-
SHA1
fb032ea5c9a71fbb0340efd3f318434db6c90cb7
-
SHA256
6291727d9930b3e4b290267f489dd594e2c4bf6e20729ccb9d2fc545f7400de9
-
SHA512
356070528d17f606c5dcd0e1f09e12315f02c52332cac4e686b64456371d4885b6e86021bc2972e8380568c6bec0f96469f59d4bc18ef53d3a2ec5cc601582b6
-
SSDEEP
1536:SRbj73lUlAAjyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SRD3NQyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 4844 msedge.exe 4844 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 1012 4844 msedge.exe 81 PID 4844 wrote to memory of 1012 4844 msedge.exe 81 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 1728 4844 msedge.exe 82 PID 4844 wrote to memory of 2692 4844 msedge.exe 83 PID 4844 wrote to memory of 2692 4844 msedge.exe 83 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84 PID 4844 wrote to memory of 4172 4844 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\92cb8b36b1043823a42e9e6843ec3856_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2445961135246713823,7305585058117488932,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,2445961135246713823,7305585058117488932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,2445961135246713823,7305585058117488932,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2445961135246713823,7305585058117488932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2445961135246713823,7305585058117488932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2445961135246713823,7305585058117488932,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5c8b1e91165c49c02adaf7bc91585ff56
SHA19e487d1d14f0a792ac5643f63cefaa868670041c
SHA2565fd8455cbf8ecbef6ca0ca27d9eaf4caab000d192b4729d6ca6858b9d6ef2d1e
SHA51241f0d88f058be121378c0f2265396f296cddb6bdaeea17a5a8cb558d2d449e8cb69769d2cff8cfa4cb4896c601bcf29e72200306705e68f42b90243eefba6fa0
-
Filesize
6KB
MD584d60869e118bf3605fb1d4dc6df878e
SHA1202b6aa9f73ba622e19289f73ebc4adf76877399
SHA256ef573222ffd9c4aa8db729303bab7c48c695c2c460b7da5a62a59033e4360bc9
SHA51243f68a066060b4486526409deac2cdf2d223ab09bd6b59d5d7adb008a1858b2f6e70868a6c4fd509ebf1ce8c1eefa981549c3718a47a082d607e9ad180a2d916
-
Filesize
10KB
MD5fb65d69afbd07437c798a9527207e8c7
SHA1271d419037ec5ddfd8da4007f9c6337a595039f8
SHA256e7dbdb7c506398be64a2868c1f2b14307562f34b8f9b71559998df3fa7318aa1
SHA5120cc261806e083e417187c441cd0235a60431e0fb8a67611b07a1db65665a086445f9ad5802da75258559b5b2fe891b03b13095b73df8d4b1b1bc84f19636ac29