Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
98f9396070146f471640b0a79bea0035_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98f9396070146f471640b0a79bea0035_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
98f9396070146f471640b0a79bea0035_JaffaCakes118.html
-
Size
220KB
-
MD5
98f9396070146f471640b0a79bea0035
-
SHA1
fc1369fe400e2094045027f3bfdd35be6deb5462
-
SHA256
3874f4b113a9ef942cdada139cdae9655dad97825c44aed22b65104f7e777ff3
-
SHA512
2bcb12e5315549c9a0becfc590bea1f1fd5a925cdfdcc6ecd6376af9e56675a0780cc8f01957f492eedfa7329816221c5106b97a6f1cffac2810f7e12f7d2bb7
-
SSDEEP
3072:SGRbkPm+ecZ2NFyfkMY+BES09JXAnyrZalI+YQ:SGRXh+sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 1420 msedge.exe 1420 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 640 1420 msedge.exe 83 PID 1420 wrote to memory of 640 1420 msedge.exe 83 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1512 1420 msedge.exe 84 PID 1420 wrote to memory of 1896 1420 msedge.exe 85 PID 1420 wrote to memory of 1896 1420 msedge.exe 85 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86 PID 1420 wrote to memory of 1364 1420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\98f9396070146f471640b0a79bea0035_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12ef46f8,0x7fff12ef4708,0x7fff12ef47182⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8440934469383190440,3526890001581090471,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8440934469383190440,3526890001581090471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8440934469383190440,3526890001581090471,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8440934469383190440,3526890001581090471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8440934469383190440,3526890001581090471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8440934469383190440,3526890001581090471,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD56fa183e6442898500b98b7131101ab2d
SHA114115c7af5bc7513395883874ded270bcc84a78b
SHA256bb463e825daee7e3a755bb7862d1ae82464976bd6679d761467c45251b6c361f
SHA512d62c504ec46cd09aa92224e80508a63695ee29317d4f66a3d8191e0751c57821037864d45874838b7d8e5696d6966bfefbc4b15eafd397e4dfeb498d30bb44b2
-
Filesize
5KB
MD5f9faa6be942b76aeb6cbdd9d569b0e94
SHA1efe3d0492539db92f79396ada462fa941dca6243
SHA25641b816106c11bc9662873d0c575d05153a5a7165c1f58ee43a9d215d225ea069
SHA512043a5c865c9b9ab0ae82aa45b7007d2b09fcc18246c624b3d6d259c34d3b743bc0e06f1e8a9e34eec73f96f7583269e48489276d8f7e839ab5de00574787ee25
-
Filesize
11KB
MD55d17fd01207d0516299331f22a6a57fe
SHA1ad894eca814bc6251e52e74b661b53188e75c08d
SHA2564d5a4d89fc3f953c06fb0e871c53cdc2f1fd8efd86cd511da9be7b2c5d877bee
SHA512582eb7d29717720c7dbc83ee7ce0f1516fe8665068485abb6ef96c7c6286e1c05ebfe11af7d3ea4b564c3854c56730db384406254330448f5fc205d42ed2e80a