Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
9100296e53545f976f342b5515006707_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9100296e53545f976f342b5515006707_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9100296e53545f976f342b5515006707_JaffaCakes118.html
-
Size
19KB
-
MD5
9100296e53545f976f342b5515006707
-
SHA1
0fe39196be6484f759f2eae45055e0773cc10065
-
SHA256
967d2ffe04f2750c3c5667d6c01e5aaca14b4a0b91778bad384c6adf29778a9b
-
SHA512
a4c54385468b5f98eae01a88bccf650980505f63519dfefd760789c5d0f32096b0ca95e407ad03d77166f6ecd510ad24eafa5fd812ddbaa5158a94ee48f3e196
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIh4bzUnjBhdH82qDB8:SIMd0I5nO9HZsvdcxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 3440 msedge.exe 3440 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2564 3440 msedge.exe 85 PID 3440 wrote to memory of 2564 3440 msedge.exe 85 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 86 PID 3440 wrote to memory of 2140 3440 msedge.exe 87 PID 3440 wrote to memory of 2140 3440 msedge.exe 87 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88 PID 3440 wrote to memory of 4696 3440 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9100296e53545f976f342b5515006707_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9243938626444961688,18158806280080545928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,9243938626444961688,18158806280080545928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,9243938626444961688,18158806280080545928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9243938626444961688,18158806280080545928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9243938626444961688,18158806280080545928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9243938626444961688,18158806280080545928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5573023d1e7232a7b705f6c2f1dbcb66e
SHA1a97ae98348a3de535f642cae65c7b92fa0bd2eba
SHA256adc9d8cc9d26140ee01e3e74b1afdfc3b5b27c2b05d43043ef9a9fb9aeb7da5a
SHA512c87bf031b44d9eb4077e27588453d14b7e14bcbb7a824a26099f01a3a4bab60b3783dd7fd1f7a8abeead3d14cd9aa610511792a9b78fd67ce24c003cdff4ae74
-
Filesize
6KB
MD54b5116e7bf19e760d20e08fe3c2cf957
SHA1ce35170a5e30d9a8ebb717151973d9cabeb0191f
SHA2566caa725f8cdc6e9f53e1131454400dbf92edc8524d366a37af828bb50e35edaa
SHA5124db8ba69b7fabf1fb91e1898ddf62fae30be5701da50ae604d25f61495f2002044083575353a1fe27b509e78bd9810dbc5072f6c3214650e82f718a54a52fc95
-
Filesize
6KB
MD56e15559d6d1c99aac4a419c55da1c11c
SHA1c1d4850a4dad0d69da455b0bc114db20309b5c01
SHA2568e536bf39fbcd468ea97e2269f84b3319bc08d49afa0bebe3ff802497d772461
SHA5120f86f127720a9951b53e19fecec08501432fa86be23131fc8c0da86acfff6b8a82ee857e88f99467bbe380367aa5d9981e8e27a9ffe628e99594bd507d6709b9
-
Filesize
11KB
MD5a97c31ecaaeba03b15623587cc80c202
SHA1010eead7d2a5097b9cb06ee60738f66fae531695
SHA25613177adb6a86a21e0d8dccb7fcb103d0f19e29fb93c29c76c6b42bf51895a0da
SHA512eb9afed9134f9ba769c30949fc730a607424cbb9743b1a207d75015ae5778a2277d5ea695f49524b3e4e7f705e7897967200c481a209df5ed4ffd5c4fdca4289