Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
934b111cb180efb2f2967c75f62c1d38_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
934b111cb180efb2f2967c75f62c1d38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
934b111cb180efb2f2967c75f62c1d38_JaffaCakes118.html
-
Size
145KB
-
MD5
934b111cb180efb2f2967c75f62c1d38
-
SHA1
739c8a564b880ff045fb49bc69cad882e0177e2c
-
SHA256
592ed161502e1e9e4f9aa31b13d10ae352a5505c82b96fdc12d4d2558d527493
-
SHA512
7efb988918da506769fe8ba19e6de0078983c1053a8e8ce22fd5dc625b77192cf3e9dac9910b51fa3f30bcdac6b5e704b9c97d7df3729b61403fe1f8ad110231
-
SSDEEP
3072:GwuJGvWDUO3e+/HkBxRAT3qZ7Wqq8bdh+fcdAdpFpqrBSQlks0k1yocTI94dDauE:PWqq8bdh+fcdAdpFpqrBzlks0k1yocUT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 4296 msedge.exe 4296 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4728 4296 msedge.exe 81 PID 4296 wrote to memory of 4728 4296 msedge.exe 81 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 460 4296 msedge.exe 82 PID 4296 wrote to memory of 2900 4296 msedge.exe 83 PID 4296 wrote to memory of 2900 4296 msedge.exe 83 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84 PID 4296 wrote to memory of 1904 4296 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\934b111cb180efb2f2967c75f62c1d38_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4ec546f8,0x7ffc4ec54708,0x7ffc4ec547182⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14712817684279220597,938160352265525633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14712817684279220597,938160352265525633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14712817684279220597,938160352265525633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14712817684279220597,938160352265525633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14712817684279220597,938160352265525633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14712817684279220597,938160352265525633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
583B
MD59bc5cbeda7eb1535fd626acb3acb7555
SHA1269a9a1d06a138de0aeee6263922c67d7297bbfa
SHA25690af1f43595ec5618ae97cf1b0166592323ad92552d53314f8b43829027215c9
SHA5124a44ff9aa3d1697d205fa04bcba802066480992a7b6ffef599a4d56817d3783816594dd2f26e2de7d16684e370b2c8766cd884838da6eef018ad8bbf0874a8a8
-
Filesize
6KB
MD596e1aebfe9b1d83dc89f90944d93c3ff
SHA162f8f1c8d295f3a8c11da09126f84ce23f2ed798
SHA2562e2edcd47c56fb73d3c1d078c2f9f6e692cf28bbad8b7b070da16235d6372f8b
SHA512c46a4a62730ff1c00d103d45ecc4fe43eecb44ecbde2c4b7173aaf1c86904f9ed46ea01c5b21bb1c869bbc63290eb90ee22b66af03455ca65efb889ef82ca7a0
-
Filesize
5KB
MD599e05ece2b2db7281ad340df058536c3
SHA1d243ec502b958ad29716f59888e2e28ac1cf4aa2
SHA2561cdf77ea717879ba04d6161861b306739cbff336799dd7d5f248730f7104eddb
SHA51265d55696f2b298d39a780df8c34a370f56ef79418d59d84ec66f8cc17008698e9430d18bd09633baacdb00ab664317648e2db3a19dcbc1d777636f4685b75ced
-
Filesize
11KB
MD5991b4d109899d05c5c70dd41246679bf
SHA16c5f8699264f58c3bf76f168ac86861aec1b853b
SHA2560e4e494f34acfd75dd15760502271cee1bedaaacebe2816ce302cb7e9104b6d2
SHA512cac795cbe30bf0a686272375d7cb9f43bf6e449df18cb65b303226d26f68919cbae778d9b80f438153ab3e2c08b6552dd0b62044744b48080ac8e884f82bd134