Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
911900e54d9e88ab8ccc4f5fcc3c556b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
911900e54d9e88ab8ccc4f5fcc3c556b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
911900e54d9e88ab8ccc4f5fcc3c556b_JaffaCakes118.html
-
Size
154KB
-
MD5
911900e54d9e88ab8ccc4f5fcc3c556b
-
SHA1
2186b28016c2f68f71527d731a627ee4555b2cf1
-
SHA256
eb370035e25a8d476ef4add4ebf5171678accd9f210cdeb42017721ac91d252e
-
SHA512
e47ed70411e03e81caff9b00306606b2da9c8da6152a5da637176a2b211d5bb2a65c57ee099796f549b646ff293b3e291761f55b35c826ecc113ac8f705e8739
-
SSDEEP
3072:SbPNQomkjM1uec8IyfkMY+BES09JXAnyrZalI+YQ:SbPNQbcM1uec8FsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 3640 msedge.exe 3640 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 4020 3640 msedge.exe 82 PID 3640 wrote to memory of 4020 3640 msedge.exe 82 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 4640 3640 msedge.exe 83 PID 3640 wrote to memory of 1748 3640 msedge.exe 84 PID 3640 wrote to memory of 1748 3640 msedge.exe 84 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85 PID 3640 wrote to memory of 1084 3640 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\911900e54d9e88ab8ccc4f5fcc3c556b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7071145650034128840,5713922105025545326,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7071145650034128840,5713922105025545326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7071145650034128840,5713922105025545326,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7071145650034128840,5713922105025545326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7071145650034128840,5713922105025545326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7071145650034128840,5713922105025545326,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5b97c8fa779ec4dd14fa10e487877f641
SHA1c26976e731099a0ec0c627237e8efe8dc1bc5974
SHA2569e897364aed4cc7b5bbfdd3601db6ac9260692240da91560c37afd869b366769
SHA512824b99552cbf0732169042cebe2e215454061773551c89fa299a1c4f7b9a5f9e87f31d3d99dca97f1c7f5a5e1f82dd1bb357e30f1836a8b01908a8151ffafd55
-
Filesize
5KB
MD5ce951d7f4bd7799821234c11bf73e3c0
SHA1592f9e2fec25db922a11beee4b077e55d6da63a2
SHA2563dcaa4ebe8d633af982be555b54034613934480c1b1e62329e5411c35da10e69
SHA51292d4a9fcf7329f94bf8907b0ae2e300f5e563a88c84b11300288ec477b50600f339514777f510ea5dd317bebc463ab541ba2462bfb14873a600b2758e4583491
-
Filesize
10KB
MD517c2f9bde3ce718ba99af7a64b1e8695
SHA18c846a9f5f4dcd760445c25784c9fec381cac07e
SHA25694ef4e6f33b1f58341276cc9db367353dd5e3eca1b05f7ad20cd5424bb884146
SHA5124eeac3cf684bd82c67040d6a5fd42a596423fb241e44971bea89d421efe6758cf5421103ee0ac577ed1189d588169ca8a0ca51731bfc8e1565f0be23c9d23dc6