Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
91fdfbb3788608dcb91833edb5f9fe39_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91fdfbb3788608dcb91833edb5f9fe39_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91fdfbb3788608dcb91833edb5f9fe39_JaffaCakes118.html
-
Size
139KB
-
MD5
91fdfbb3788608dcb91833edb5f9fe39
-
SHA1
8b65b5d1d1697f3e35626acb2c49e05c858661b0
-
SHA256
88cf7cbdeed284e86ed4fb9baa6117f2b044f027babd624e5d4cc28371260f74
-
SHA512
fd0b54779532a81af581df7f5a87c470292c48405a08d046690af3b3b1b93d99c700d76071891bff5d3e2bbf926968a0a7417b434a5f712e263228f6e16c90ea
-
SSDEEP
1536:Szvki/lVOlAImyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:Sz9lDImyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 2012 msedge.exe 2012 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4460 2012 msedge.exe 83 PID 2012 wrote to memory of 4460 2012 msedge.exe 83 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 4112 2012 msedge.exe 84 PID 2012 wrote to memory of 3636 2012 msedge.exe 85 PID 2012 wrote to memory of 3636 2012 msedge.exe 85 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86 PID 2012 wrote to memory of 1608 2012 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\91fdfbb3788608dcb91833edb5f9fe39_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7470209313969985957,4199435849961111833,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7470209313969985957,4199435849961111833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7470209313969985957,4199435849961111833,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7470209313969985957,4199435849961111833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7470209313969985957,4199435849961111833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7470209313969985957,4199435849961111833,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD59cf1171f5b03af7c049d5d97fd6378f5
SHA1331e9d313419e7caaaa82e1e0e6de97c1d1e35b1
SHA2560023b5223ea9c47d39f9a38b34ae13e5122259821aa52c78918b7888cdda18f0
SHA512a70051130d02f5760f8e25a8341b09ef105452465b135d9a44a3b5ff8cf4e57da5deff6c273cda010406fdfe35f89656d0adf027bdd9effc343f3ce7e744f80c
-
Filesize
6KB
MD55834ffb9c185aaa66bc35adff5bf78de
SHA123f97612e0f3b10a7065724bcc87bc12e30a1171
SHA256d733f053e472cfa7e4d2657603de3d41669aca7d7500a9c0fe35459d341910d0
SHA51268089c1a7a830c0df911567a7ae7c829554da2dcd16b58444e8b640ed2b16e1aac6da31f4616bff43c2e83dc78c0642a3a7ae552250332d5df2b21711f1523f8
-
Filesize
11KB
MD5bd57644db2a222a8339ea111f2cba42d
SHA16819d04a12f8c57a3128d39b0fc123e232406a11
SHA256b2b4c5e155f25a9c3b88f8705f152ffd9180d2624f36b3e4a0f2b8ea6669bb1c
SHA51273f11298585bb7e9866b69104dc99f503628b988677b2156168c32b7a723fd4a913e31c3881c713f64f2c4263e11d18256eb3986d54495e47a7a2be8cf231b77