Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
980f1b5cbb3fde159560561e97f0e74e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
980f1b5cbb3fde159560561e97f0e74e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
980f1b5cbb3fde159560561e97f0e74e_JaffaCakes118.html
-
Size
18KB
-
MD5
980f1b5cbb3fde159560561e97f0e74e
-
SHA1
6c3ba05174e3aaa72c9ccce96c4b86a6ac60b554
-
SHA256
da9b3002c91cbcf8c6229b1a1f3084af560361799c2fe31de241faadbce15ee6
-
SHA512
796157171dbeaa515a7e1ce8a283f79d27d2a1ebb9d76de03e75c917a90d3d488b67aaa7d2347bd4b0a07a6e98172a08703e05064688dea9734fc9fab42831d7
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI84yzUnjBhew82qDB8:SIMd0I5nvHDsvezxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4088 msedge.exe 4088 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3200 4088 msedge.exe 82 PID 4088 wrote to memory of 3200 4088 msedge.exe 82 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 2996 4088 msedge.exe 83 PID 4088 wrote to memory of 4460 4088 msedge.exe 84 PID 4088 wrote to memory of 4460 4088 msedge.exe 84 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85 PID 4088 wrote to memory of 1036 4088 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\980f1b5cbb3fde159560561e97f0e74e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb923946f8,0x7ffb92394708,0x7ffb923947182⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9999883100111732262,14532506100525423638,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,9999883100111732262,14532506100525423638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,9999883100111732262,14532506100525423638,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9999883100111732262,14532506100525423638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9999883100111732262,14532506100525423638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9999883100111732262,14532506100525423638,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5042c42327470d8e172a38cb4832f9e03
SHA1160e7d9f8f9238de23c1dd7bce81aca46a2caa53
SHA2565302f9dd4b671c533eef2f047d95139108d4ef2745e5b5d0c1af71dd70b854df
SHA5129a5e9cdfc8021cd2f91ac70cae26618dea46d04c3259772198757caea9446890017901be4cb0cd112204f0438df1fb7b8d396437c05dc62772b575a6fa9755c4
-
Filesize
5KB
MD5411ff3d455c038f659d3bb49fa31c9e9
SHA1b24d7fc5b3f3ed691a4004f9ebf4cda560c32196
SHA256b4e8dc361aa25d8b80754cc735d4ba47aaa7e6819c5dc4344dc9428c7692f06c
SHA512f55ba377a5104a05e7d718162fd71e8c5a1840ee6896c55701286d09a5bdf04618d7b7c91ea7422269c97f1d531a51b3fce528883b1367047c0651a654ba1f00
-
Filesize
6KB
MD596936bcf0478eec8e5b44c5aa65fcc8e
SHA1a612924cc89c7ed9d5fc53c7c78539fbdb752e9a
SHA256f32c41e75a693c9f7b4bbab80ea5b6ebf81e1e3e07ba067a120a75daa5200df3
SHA5121b4dcf5979c0ac42fb87f66eb2825e42b809f2c26fa7a29fd16d4799ee2dcc8002e5085f41b2fc0a2a2ea965f1f998a708c27d5af266af75872e99d0edfe3732
-
Filesize
11KB
MD55ebddf4b37bf67e4dd6939bd2fd20c1d
SHA121c5f0754bf5ed644456fca01b264f2659ebc391
SHA2560d7f73d94086e38d072166a6bf17333151d17d93aef4d8b5ae55d567dde010ef
SHA512bcb7fa475808b5368986d4f4795bff7b8b6e27c5e0ee7df96d56b44f4f285da7ccb886a0fa033ac9e62c988984e834a52098bb05ddc92cf11f8ee6272925320a