Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
924c979e35665e4e0b4f2bde78452c5b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
924c979e35665e4e0b4f2bde78452c5b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
924c979e35665e4e0b4f2bde78452c5b_JaffaCakes118.html
-
Size
40KB
-
MD5
924c979e35665e4e0b4f2bde78452c5b
-
SHA1
e42f71d7ff7a1a75043a4c552e4421e554ffab77
-
SHA256
ec1902e869b3b5a1316b5d042892007ad4c92dabb2da09ffe331e58af798be62
-
SHA512
be7f1aaea15d2944b0c9b9485a7c79f7fee1f3e1a9a7d10a5ee2bd105adde690495196470a87b7cad409995c054143df5ba98d571a86508a0a79bbe35c3debbd
-
SSDEEP
384:Jb0evAJ3C5t3IUkvKH5v5jk3qgSpMh5jeNzODL7XG3GJG8D7b55euYeSG8GgGVGL:FvAJ2IUL5v5j6qgSpoIOnT5q84lfd2p4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4800 msedge.exe 4800 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1096 4800 msedge.exe 82 PID 4800 wrote to memory of 1096 4800 msedge.exe 82 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 216 4800 msedge.exe 83 PID 4800 wrote to memory of 4244 4800 msedge.exe 84 PID 4800 wrote to memory of 4244 4800 msedge.exe 84 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85 PID 4800 wrote to memory of 4756 4800 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\924c979e35665e4e0b4f2bde78452c5b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff05446f8,0x7ffff0544708,0x7ffff05447182⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,18209703045788152481,4247476611675142290,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,18209703045788152481,4247476611675142290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,18209703045788152481,4247476611675142290,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18209703045788152481,4247476611675142290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18209703045788152481,4247476611675142290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,18209703045788152481,4247476611675142290,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD50c696e4d9ce90546e0472f3ce5eaf76b
SHA144f491a39d52893e921e085c14b76c653cf58bca
SHA2569588807cee78776d758a668448bd931ee57fc323010125bd6e6a64750a967233
SHA5126d4d6d1a7e4ed85eef3b9d3632f0b61190e1cc6db393df4b32ad1045c84091290641f29ab60de02cb52aacd08754de08f9434172189cd78f1abd2c978d1a782d
-
Filesize
6KB
MD5caa1d10e0e93bb0a4aa37ff460927a10
SHA1b4861663312ef9e998382d0e233a7cc1089eeb11
SHA256cb8d5721b4bc65fa7c0c5127f7ea900e4c6c4e3d1f9279e0a275e2fbe9c24a8f
SHA512bc2964481144c90d53590bb0f93a8fe87dcaeb4572e685fac5fcdec7373693efbbe0bb250fb459345ff93c94506748bb48b7d287639a472bf8602a5042f8ac40
-
Filesize
10KB
MD592ff56ff557a7c3735209322dff9e1eb
SHA1d17e636e027bab51f67a7fc05b30c96be4eaa7bf
SHA25644e498ef60f346228ba933f373715f33e9ac21b788a7e1015f13ee0481417d82
SHA512d135ecdc4d66bb9e34ca4b918f7af984c15cb064c148499eb68ce040f5108139014629b3c4e620cb3966dc377bf5a370997c281c36368da648815cb05be4c534