Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
9a26a64432418cc52083bbb5aa30930e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9a26a64432418cc52083bbb5aa30930e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9a26a64432418cc52083bbb5aa30930e_JaffaCakes118.html
-
Size
139KB
-
MD5
9a26a64432418cc52083bbb5aa30930e
-
SHA1
0015624cc1758e5e9d2ca4652dec0a23cb90acfe
-
SHA256
6b0da322979c916a46da6ccb2e78c63b3e955db20239d5cfaaf3fced1bdf1828
-
SHA512
d80be2c55b17cc94b072f633cb2e60d5980532b117de3b5ad93188845341d607ce14c35de1616b207c754666fc0b4cc5b1a9e811bfca02a6d34004cd177b4115
-
SSDEEP
1536:SJzPJO+A/iAlbfyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SJc/isyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 4388 msedge.exe 4388 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 448 4388 msedge.exe 82 PID 4388 wrote to memory of 448 4388 msedge.exe 82 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 3548 4388 msedge.exe 83 PID 4388 wrote to memory of 4620 4388 msedge.exe 84 PID 4388 wrote to memory of 4620 4388 msedge.exe 84 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85 PID 4388 wrote to memory of 3820 4388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a26a64432418cc52083bbb5aa30930e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e5e046f8,0x7ff9e5e04708,0x7ff9e5e047182⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,5037309575396164721,9159925103359060824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,5037309575396164721,9159925103359060824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,5037309575396164721,9159925103359060824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5037309575396164721,9159925103359060824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5037309575396164721,9159925103359060824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,5037309575396164721,9159925103359060824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5f193be69243f682ee9fb3e37fff88fca
SHA1940b9a6bd753b70214222f0835abe33ec6cd9e83
SHA2568b0b904bfdcd673e226a72049fe279a1e1a03e15b2d7b59bbb6d341f5b78652e
SHA512449cbf3c5538837f73c7e7cff4ab3c078bd940fb011d858354fd30a100f626b2385fd07cfaa314245f161bc3c4b82bcaca0941fde066c937c5df08cdbad96ed0
-
Filesize
6KB
MD5849eba53ab31f14e64a136313e16e07c
SHA1442578f4f6efd225a08079eb18fa18364003a1a7
SHA2561910b1b584e16fca6594ff6ab29e829425e09d6ea1e5384a7be352b57e9c03c7
SHA512baeda1b5565f305bb7911f397e3526000d82b17fc03ec0d825f543fda0d8d01fe0e4a1c0b1f2b835f637545a13af626596a92f7de291be307e358e65c30dc646
-
Filesize
11KB
MD58fca866d8c8e343d48f06dfef841476c
SHA16b49fa48ada6da23e4d8144e487bee5e4c8b3dd9
SHA256dc0014add02fa322a5168fbe79e45c6ec506499dadfc3ab2de06e4c3166107d6
SHA5129a5d57fc46dc485061f9a1d4f814cd62d3f9d17f0e904f61fb3c0ab3680712fa51f242618d841ee572a8b1e3c6a620084f9b25c2cd435d1c6950a2b0decfcc8a