Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
9b40b99b1f7be73e24feb0c284d00a91_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9b40b99b1f7be73e24feb0c284d00a91_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9b40b99b1f7be73e24feb0c284d00a91_JaffaCakes118.html
-
Size
19KB
-
MD5
9b40b99b1f7be73e24feb0c284d00a91
-
SHA1
4549a5df927bd2139fae059303a87863d43a2835
-
SHA256
4101b08e64d3f6bf4287cd75063135ab69a30009482169600fabd230b375d40e
-
SHA512
c407b1e742b252b816288530a396db12f3bbbfad2b3240343d150840a0777eb70dc7e84627b337b10d83a61f54aafcce910836087ec2935a41aeb2ec2fb3a4d2
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIf4pzUnjBhjF82qDB8:SIMd0I5nvHNsvjexDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 3404 msedge.exe 3404 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3884 3404 msedge.exe 82 PID 3404 wrote to memory of 3884 3404 msedge.exe 82 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2352 3404 msedge.exe 83 PID 3404 wrote to memory of 2340 3404 msedge.exe 84 PID 3404 wrote to memory of 2340 3404 msedge.exe 84 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85 PID 3404 wrote to memory of 2640 3404 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9b40b99b1f7be73e24feb0c284d00a91_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8873688136232558690,10636217610640635416,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,8873688136232558690,10636217610640635416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,8873688136232558690,10636217610640635416,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8873688136232558690,10636217610640635416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8873688136232558690,10636217610640635416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8873688136232558690,10636217610640635416,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5aa675687bfc8a07cb1da793c7db2a1da
SHA1af76696f61fe23824865ba04b2b75008efdf58eb
SHA2566140971619c4ef4cf3946b9fc075c4ec009759082f1b26dab2b0d39654b2ca01
SHA5120c78eee31a3b4081be6cebcd49c920d0c77c28ec54f468a402196008738e520ff8525fa018fb3311cf77b330b0d3bceac91c2808c99a7d41e155699c0afb46d0
-
Filesize
6KB
MD5fea138d930ea82e25c79e27d41bb449e
SHA1a6a249dbe5dafd7a22e5c63933da78444cdeba3c
SHA256b129aac463bf1d1dc32ffa50e763b7615beb8c02531db374d63033ba565256c8
SHA512cd5a48277f1a21ce41a3090b2f1f7f2b146b63d5ba0fc70a2773b0b2f6ac895884901401f62c88189f904c14b28386841bda5ed78268c2a60cd00bc311aacff1
-
Filesize
6KB
MD5d7e5387757b5fb8a0c066cb5ddaf69b8
SHA1c05b31aa4d0b735b9a74b5597ef2671dd9bcf95b
SHA256d0cffb52897bc1a1d85b6a1353ee90f6c3038946a5d6d1e0f4a59c4457e0fcc4
SHA51248b65ea637ab0812f3a0b7c644ab94300938ddee5fd4de1dee2f0fb7c7da40b0e5935126db1bd48ba910e17bd7fe8eee83a98c5be66ba4f0fecb3f54070d9565
-
Filesize
10KB
MD59a38e0d541b21116593a75346351f310
SHA1697baf4ce0d7bd665c264327b46991bb91e23618
SHA256f22258e94162fcaddee817584ef6cd0bbc4070cb047a9d5ad9213d7dc326aace
SHA51219d8b56033cbf216c11e9310654de20fbf9eeabfd630f41465789719817c291b7fda9ddd93aba2fc3dee988c0a06fbe54699cd454b01fb919b05b2c8985ff623