Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
95f16cf7e253386a66dc5b0e51429f79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95f16cf7e253386a66dc5b0e51429f79_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
95f16cf7e253386a66dc5b0e51429f79_JaffaCakes118.html
-
Size
139KB
-
MD5
95f16cf7e253386a66dc5b0e51429f79
-
SHA1
3fa2a2e4ccd5ab452b57006ec253f09908ec0dac
-
SHA256
5fcb41d536f12536f6012872fcf0486cae9aa3a9fe35b42b440cc1cb73864f56
-
SHA512
1a0bc0db7b73418bcab35cea4783dc4cc98608862d83e872d68edcef0503238b9c347217e279ee85e8e4bcb7898c8ca0cb67ccd909fa069b3fb39de70b3f5eb1
-
SSDEEP
1536:ScrNaS4j53lyKAyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:ScrrKAyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 3888 msedge.exe 3888 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4796 3888 msedge.exe 81 PID 3888 wrote to memory of 4796 3888 msedge.exe 81 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 3484 3888 msedge.exe 82 PID 3888 wrote to memory of 2840 3888 msedge.exe 83 PID 3888 wrote to memory of 2840 3888 msedge.exe 83 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95f16cf7e253386a66dc5b0e51429f79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5fea46f8,0x7ffa5fea4708,0x7ffa5fea47182⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,10206664623959452562,8117620040763036999,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,10206664623959452562,8117620040763036999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,10206664623959452562,8117620040763036999,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,10206664623959452562,8117620040763036999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,10206664623959452562,8117620040763036999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,10206664623959452562,8117620040763036999,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD53c4a2cfcceef6565bd2a9925e1c1e298
SHA14fb633a36959709ce11b1a6fbc41f8327051f60c
SHA256622c9f0e1474581ec0a1765a5f000c209a7c8dec89a4cdac78ca12e101020c8e
SHA51223fd5f27ca910faaa440f5b2a712263493badc6c78d15b07c1069e6971a9c4b682cd2ac6a123346b998624bd7a5cca1c206d4a40d4da0460d8c4b51b0887bf99
-
Filesize
6KB
MD55c37d1e11c1493c55e995a9b630f7072
SHA1f0a0354b9eae4b352c3366885e0a3378f93cd022
SHA2565eaf5055b4ed573f889e4299041f63c589e9a02fecf96408f91dc55dd1ece9ae
SHA5127e2fcde3ad06742f1cb3eeecc7f5a5275a527167e0170621321662196a532a3aa93da6fde231b8291d62541b60abaa61cbd6578917737b5cb8ad93e462d81a29
-
Filesize
10KB
MD5c96d2828e8d65d070f70700055b8f061
SHA1a88f9f83b11ab31cbaaedf8054b49408d44691e5
SHA256d441418e0e019654deefe91ba420e3b4088771b03b61f44eebca1f3695c4eefd
SHA512d499c9bfcefd889b3f6ed3565329d4c79e28a8adcc909fd4e681908c468dbb397a6fc82f58c96fddbbcf4190e118e2b70a1c6924e0c8f065c14599d853a39907