Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
985f22abbb801d81488293d52bc30827_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
985f22abbb801d81488293d52bc30827_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
985f22abbb801d81488293d52bc30827_JaffaCakes118.html
-
Size
218KB
-
MD5
985f22abbb801d81488293d52bc30827
-
SHA1
1fdc2458e94eba95c5126a48bf129a61122aebb2
-
SHA256
1ab7d51445c5f03cb055f0d89cfc86d1a409b7d02f895971533f0f2e07dd47b3
-
SHA512
c7369cae0d4526eb70d773a263b59cdb1f9c75534f655b001c631dab28db0f83fddd90507edc75d72fd9ea8e7ecb0b13bd98fb3190a7a0511db94b1961554eb8
-
SSDEEP
3072:SRyOaaSHGrDJyfkMY+BES09JXAnyrZalI+YQ:SsOSHMssMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 1612 msedge.exe 1612 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 748 1612 msedge.exe 83 PID 1612 wrote to memory of 748 1612 msedge.exe 83 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3224 1612 msedge.exe 84 PID 1612 wrote to memory of 3188 1612 msedge.exe 85 PID 1612 wrote to memory of 3188 1612 msedge.exe 85 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86 PID 1612 wrote to memory of 3740 1612 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\985f22abbb801d81488293d52bc30827_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11066248574450927362,13737869556384260642,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11066248574450927362,13737869556384260642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11066248574450927362,13737869556384260642,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11066248574450927362,13737869556384260642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11066248574450927362,13737869556384260642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11066248574450927362,13737869556384260642,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD56cd6676477bc9db9bc8735ca8fa064c0
SHA1da7ad38ae351182716cb4b5a2819d8c6c302759b
SHA256ea870052d0ac9a2de3b1be6c152ae8f42a4d2d227842095630fa120302505aeb
SHA5125d93662de72d59ba15667b864ea62a9e9cf07eea4c0ec334b5c17fdd8cf9bb35414ef621e97684d17052aa9b890ede27053eb0d7f09ae8571e3a781828b5a3b6
-
Filesize
6KB
MD509566479ee2c19f25bed05abd626a670
SHA1f3da9a06ed45d490cb07d77cb3ac64d055298be7
SHA256b939c4d60f58567b539a1fca870ed9d932d881decd5d8dae841fce9d29cd329c
SHA512a24f2879c6e32de28743881006be6c55ab2449626aae5079ec9b5c3045ce1736d8c1d1a2a554590191946c41793286c52878aecff02c755e0da0b97a2e83a223
-
Filesize
11KB
MD5b2e31a2f4ff5015da83485f1b6dc9d78
SHA1a09167bc036f04a2a086823cd2ee99e88adaeccb
SHA256ace67122abea1a469c9ae3c1113d488fd046392e3a8250c2faeae91f9b568c4e
SHA512d5fba142a37d1cd7296065b31037558aae3690ce4b53cc398683f1b6b2a43b6f53e77abbf4432737487fcecc4a4190fac5bf68506166a31312835ade68b49bcb