Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
90d0f108d1c3f87db5573fd9a90b1467_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90d0f108d1c3f87db5573fd9a90b1467_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90d0f108d1c3f87db5573fd9a90b1467_JaffaCakes118.html
-
Size
140KB
-
MD5
90d0f108d1c3f87db5573fd9a90b1467
-
SHA1
01a9cb9d7fbfea35e1fc0f5cdb88dfd99647c3b9
-
SHA256
36fc14901595bc680f257c230fa9dc09b7822227020f270ce09f785a1da40caf
-
SHA512
6ebb14217e12dcda081dd70359ce09988f333fbe969ccfe6b67435c877416ec2fb620f7210396a95025432d98b8209be4d0b881c23dfc58fb1b9ee01821dedd0
-
SSDEEP
1536:SxrGQJT0lZ3byLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:Sxt8yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 2548 msedge.exe 2548 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2064 2548 msedge.exe 83 PID 2548 wrote to memory of 2064 2548 msedge.exe 83 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 4792 2548 msedge.exe 84 PID 2548 wrote to memory of 3892 2548 msedge.exe 85 PID 2548 wrote to memory of 3892 2548 msedge.exe 85 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86 PID 2548 wrote to memory of 3568 2548 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90d0f108d1c3f87db5573fd9a90b1467_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd179146f8,0x7ffd17914708,0x7ffd179147182⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,18326745285162118196,14905459457004360089,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,18326745285162118196,14905459457004360089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,18326745285162118196,14905459457004360089,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2464 /prefetch:82⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18326745285162118196,14905459457004360089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18326745285162118196,14905459457004360089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,18326745285162118196,14905459457004360089,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD5b5f5751d80c51161cc000588259fa9a5
SHA1d65a3cc1860a923912b2a927e6f2800fac0f51e2
SHA256a678b6f3c057f4bc5b74559a908704df8c6b33e74c0d4a5db93764e3580daeb8
SHA5127274be1684709b8afebc432c412287604f02f1e4f204648ecbfdc2f06275fd3c9b8d408385d5922ca3857bf65cedf57f5ce86d57abe7517f04b8d1facb530dee
-
Filesize
5KB
MD5867e2408f27860b16b5de06a4d522f08
SHA1dd7a3c6700cff2fc93afdb2dc0e977767d646cd5
SHA256756105bf398ef06410f8f2b089290580ddf7822e596eb41f96665e319b259b07
SHA5127044adf38cdc62fea0e9a96199d69429259d345aa0ea487fb7619bac3897f38c7b41e808ced4dfbd95644a84e47152b176fda1c8b88ca0e801708d2019439dfc
-
Filesize
11KB
MD5e53ef6666a402d2b6c36dde90519e582
SHA1ac44a3646f61cb0bd0adb8fdfd9f09df9e231bdc
SHA2569937aa8ed5485ef829d68c04d732872763ed5cb8966e55d4779386c0207088dc
SHA5124976e82e8ea437c922278f6ee20fa184080f32e894b4b2147cd6a4e94ec63fc9f47daf51f9310118e7ce1af5ae556e5217b2d594f03ba2a4a47545d7a0fb2d0f