Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
94817958159c00c89456e24b37aca52c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94817958159c00c89456e24b37aca52c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
94817958159c00c89456e24b37aca52c_JaffaCakes118.html
-
Size
41KB
-
MD5
94817958159c00c89456e24b37aca52c
-
SHA1
f31c8705942782ca773f03064874b54566dec34d
-
SHA256
6976305fe5538d074ebf3b4ff7ac7482e52c882171c7c1306117ea13e80148f9
-
SHA512
a10251a6b77207b1827af1830b6e29e773b253e290fd63d72ddb6f9c20d54c5364556bc078b526512bcc761110fe63aa5b9fe4cb5d33d1d91f93a0cc886314eb
-
SSDEEP
768:ThEKb1LEfijjpi1LEL7xXoEwoWMEmTbOZIi:TDZLEqj+LERX+oWMEmPIF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 2180 msedge.exe 2180 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1044 2180 msedge.exe 82 PID 2180 wrote to memory of 1044 2180 msedge.exe 82 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1620 2180 msedge.exe 83 PID 2180 wrote to memory of 1748 2180 msedge.exe 84 PID 2180 wrote to memory of 1748 2180 msedge.exe 84 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85 PID 2180 wrote to memory of 3428 2180 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\94817958159c00c89456e24b37aca52c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc66746f8,0x7fffc6674708,0x7fffc66747182⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,3543351739511501466,17127247618294503889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,3543351739511501466,17127247618294503889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,3543351739511501466,17127247618294503889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3543351739511501466,17127247618294503889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3543351739511501466,17127247618294503889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,3543351739511501466,17127247618294503889,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
186B
MD5724012dee83b21307a7933250439af6b
SHA1a46993ef2bd462b3a809b8d9c96837e2a7c0015f
SHA2566816f1cf79eb99353ee3e28b89adc9818c7b869adb34a36fe9c378b8e238b5b7
SHA512bce2829690f9df21a8c998fb16e59546e968a4f7ec0bab8e6a7d92e3277434c0c766d24c1ac4dba221e6aebd870ebed9b21e696b67a851627309363e456faf0e
-
Filesize
5KB
MD5863b917368aba1f11e05d95f9a64fe7e
SHA155008cd82c57490b93a7de555e3bb17ad1e41cfb
SHA256ba33139a6abf9bce132b5214f6add7ecbc9cda9434ad0965e2339868647660c4
SHA5128e6daf28bfd05bd5171f9b89ba9f9fd031042d0d93678284e525ae4b555308f1139f20170258a3591b01376757ce144e64bb318dbbf18220ab6371a77fbae238
-
Filesize
6KB
MD5a5348041f69d698e55dd878d42cc2047
SHA1a0b8652009196854ec803b718dcadcc467e707c4
SHA256cdd04bc8c4829ebb3a2c91cd6a6fc49195c42a3b42d6fbe9e8c79c49f6696d11
SHA512e8eacf3a42de8f5bf0b3a42d18d2c0f14e549c0a1f9c940999576c099f1586212ab65064b82dcd487b8fb9e2b461e6ba7f371757f45c34d374220d75bfc0a030
-
Filesize
6KB
MD5001df38e6a7eb19f9e0321a3fbc8be1f
SHA160f9e43204b584d18eca0735a870554592b0726a
SHA2561af0357dbd053d48898e43bff0a64de8a1461dc0cda370193d06cb8e6cace4b6
SHA512130254a7bcbab0fc49540879eb4d3ec1717ff1566cb8c719a14ec721ede9702dc7fda23561a5b6f1e9bb8d464aa76f4e856eebdd51dbd69ec067d171640e62fd
-
Filesize
11KB
MD5e59f45206becc8ace3de538bc6d6f44b
SHA147e4ab8d15472dc1730813241846a359815c1e4a
SHA256549e13ad49b456880226b0f29ddcfbac43a1b1e4e89326232d53de3f4a9a2a72
SHA5122c9cf90be0eb86732d4822a0788cb75dd907da5b76ec70cb1aa6ab68ec75e1684cd670d45f6dd4e29af0980161bb2d8889245b12633e28abe4141c560d4beb9d