Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
9306019f0ba69e5b9bb31b65eec06211_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9306019f0ba69e5b9bb31b65eec06211_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9306019f0ba69e5b9bb31b65eec06211_JaffaCakes118.html
-
Size
102KB
-
MD5
9306019f0ba69e5b9bb31b65eec06211
-
SHA1
9838a1a0ed45cfe2e606b922728b41406f0b063d
-
SHA256
2064acea25659bbc36536018b17d337d7b46bd16da033b33113cad2ccf64b9d3
-
SHA512
299ae3b5f0c26fd106f3ad50d713bdaedc8a197a2a00a7d5737e00e82cdc772000869180126a33cd4296b664e46e73583aed17e98dacce1176bad5f7b508fece
-
SSDEEP
3072:AZNFQCBBa8b55XGNwci1am6fVAFWqSVBy:x8b5JGcP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 4520 msedge.exe 4520 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3860 4520 msedge.exe 82 PID 4520 wrote to memory of 3860 4520 msedge.exe 82 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3440 4520 msedge.exe 83 PID 4520 wrote to memory of 3012 4520 msedge.exe 84 PID 4520 wrote to memory of 3012 4520 msedge.exe 84 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85 PID 4520 wrote to memory of 2244 4520 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9306019f0ba69e5b9bb31b65eec06211_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff86ae746f8,0x7ff86ae74708,0x7ff86ae747182⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,80846528913928292,12704455539977741973,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,80846528913928292,12704455539977741973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,80846528913928292,12704455539977741973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,80846528913928292,12704455539977741973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,80846528913928292,12704455539977741973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,80846528913928292,12704455539977741973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
1KB
MD541e163c99ec3f9820619bebedd1c5b6c
SHA145dd7f91b0a810057bfa37f42e8e423d99e13542
SHA25611b3d0fac7405fff144c7b38e3f8cda90b50263c7d9218e216704595e4d18f70
SHA512c074cb3fd696c803687c481c828aaf85ea1a0e4922aa52776652cfd16cf123baa3afd1e81e3925e081098a562a2cc4b901f0144229b417607669ce1c103d7310
-
Filesize
5KB
MD5bb0065c6990d6cdb3db3637c2683b618
SHA197c22e0be4bd5f39ac0a9dec906726d9db960d32
SHA25669bd473261b0a15433ee79cafa038ce887dd635eeb17e7fc980dc17d12c4455a
SHA5128f3ac35f811f099ce8ce926faf5474cbe55eedfb34fa2f1ab3648ee690ecf2c6b8d3af1d61c91c5352fce0de3a5af5e99cdc590aa05e250493939a3a8d57336d
-
Filesize
6KB
MD52dc2ce68a6b3806aa17f2c577f4e272d
SHA1c2f5172e2f4ac4442d3153008019f006931715e2
SHA2563bc3be42cd6185fc9bbff38be2920dc94adb41b46c02ce0c23d9db8f2249bc2c
SHA512b4101bd1247d0e20b683d6049c700c9e270c1ea676bbcfcba403f9c5b79b8312ae5f17c94c2e7ec6ac6f9bfc31e2458b6114d74874421160528aa3903cc42521
-
Filesize
11KB
MD57d8f0a142095c5934abda45d514a6c72
SHA14977220c59cab2d3e1b3a64737723b5eedf8210e
SHA256208ef110e9f138fdade6edcad4183bbcc4c98cbda1adda0ab5774a7b5b5d5ea8
SHA512d11213267b000f5ae7739e0268a52b826e359af1f343b4a35905fde28701f43b49d23ce96c8e55cfeceffbf5b4d304eead07bfb4695c95eecc581109a1d0d50f