Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
9487b99efa4b984f381b888f0acd38a8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9487b99efa4b984f381b888f0acd38a8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9487b99efa4b984f381b888f0acd38a8_JaffaCakes118.html
-
Size
18KB
-
MD5
9487b99efa4b984f381b888f0acd38a8
-
SHA1
3f97af043037ccae103d573354245420aed03818
-
SHA256
b17b5a90867bfe2e3ae1c896e6ec8f5632667bd7783be23f00bb3f17b2481254
-
SHA512
d5df1f8ad67498a9668c5e1afb926d46b290356df357849b9d66f1ebb51946ed777f90d896381734473d403820c87f30cc4b3f04520065c776eac5090284b765
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAUM4GzUnjBhSE82qDB8:SIMd0I5nvHfsvSHxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3096 msedge.exe 3096 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4856 3096 msedge.exe 82 PID 3096 wrote to memory of 4856 3096 msedge.exe 82 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3476 3096 msedge.exe 83 PID 3096 wrote to memory of 3772 3096 msedge.exe 84 PID 3096 wrote to memory of 3772 3096 msedge.exe 84 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85 PID 3096 wrote to memory of 372 3096 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9487b99efa4b984f381b888f0acd38a8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7649133162410107998,930683026181848477,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,7649133162410107998,930683026181848477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,7649133162410107998,930683026181848477,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7649133162410107998,930683026181848477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7649133162410107998,930683026181848477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7649133162410107998,930683026181848477,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5ca361afc59c7e6d7ba48b57ac828ddf3
SHA137949f0f1cb3f9dbd64fa4cb093401a21b27dfb2
SHA25643e36071a6eb9f393132165ea91ab8b2a97bc69d0d422e2d91f0ed9be59fbb6e
SHA512822352b09d0fef4aa2f7e8f5a6eb52acc1b2473d0bdbb2654f6c82e4073e91fd0f5876bc8b1e8f11ae8daa53cf84c40d222e46deb51f31bb5c678acd52b79a3c
-
Filesize
6KB
MD550b2d24813a1e443b54ebabc7f2c34e5
SHA1d0ab7d663d4c896f320815e34c5e821424b8d3fc
SHA256ed1cdadaa4536c41495f15a3af9a07ba8ab070b98b69d265cc7254465d476a88
SHA512ca10ebad1f3a55dfe45a1255108d470ae52019622b37f412b80b3a58e780a7a67b9dc847956d989c682d10839b0d7bbb009d713fd52fc2f4da4cdd1e4ecd25ef
-
Filesize
6KB
MD533022a4ba4334aa9786f33baa291268e
SHA1bbc075034cc1e33965249c8ffbe796bac36a614b
SHA2561b57569035a6a8a2cccc453275cae5982c10cd6178d0ee68508ca4bf441b5196
SHA5127f0821abaa6386c1e450cd252601f8d65b76d1c36ffac35750530feb55baa80a86939b6ad6ba62b55542ac02af60671e55f670d1119c28331aee534dffc2fe47
-
Filesize
11KB
MD5fc7225f0460e3dd44061fb28c2fe0c20
SHA13fc67875ab88d62299ee90a48ed26334ff4a4499
SHA256042d6e2156abab2d69e286bc5ecf313362348654e49722ffdf58d22ee8160605
SHA5126777073cf1427bead8146d015ae2ad74f7fe86b2e09272171000db9a8893ac6c3c2bdc1064a8dd371bdf1513712c53e9b6007b5d8c7b4c1683235c293ea157c5