Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
a82d503d42ff52a278c1fa9a4a09e813_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a82d503d42ff52a278c1fa9a4a09e813_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a82d503d42ff52a278c1fa9a4a09e813_JaffaCakes118.html
-
Size
26KB
-
MD5
a82d503d42ff52a278c1fa9a4a09e813
-
SHA1
253c953ac5e9a934bd3c299ea52c9c1eae129a0a
-
SHA256
00eff0fd1cd7e77a2497994fcac1c25c5cfbbd652272f104221c5e0b1ae9d668
-
SHA512
0b7d06acb082936318f0291d6b435fa98cd6bbaf1e4535a38c7951d611103f901240e37b99ab0724eb9ae9cac08950be206f8ae55329caab04507538dd7027c6
-
SSDEEP
768:K2KQ2TYb3umu4NtvgSt6CR3ReCw5Bef2oD:KtQHb3umu4j4St3ReCwTef2oD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 1720 msedge.exe 1720 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2548 1720 msedge.exe 81 PID 1720 wrote to memory of 2548 1720 msedge.exe 81 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 1020 1720 msedge.exe 82 PID 1720 wrote to memory of 4840 1720 msedge.exe 83 PID 1720 wrote to memory of 4840 1720 msedge.exe 83 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84 PID 1720 wrote to memory of 3168 1720 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a82d503d42ff52a278c1fa9a4a09e813_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1b6546f8,0x7ffb1b654708,0x7ffb1b6547182⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,18167919975558437028,17455555204589198640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,18167919975558437028,17455555204589198640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,18167919975558437028,17455555204589198640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18167919975558437028,17455555204589198640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18167919975558437028,17455555204589198640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,18167919975558437028,17455555204589198640,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5668 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
70KB
MD5d3cf34c9c8c99f544529dc2985c590fd
SHA16e4b6d06da4c758539c18d820462bc56a4889b70
SHA256080da5977b256e4f37db20969f853a44e2f42edaeb084f328adb020d1e8f7b6c
SHA5122ff023d37db8294242a17a5fa33ce5190fd11b14af5ece96e40f3ff2ac355e9bd200a2b0887af28ac2988310117489f94c5bbf61b4c107a9af6028bd5b570dcf
-
Filesize
70KB
MD53085bc46a2fdefc284ec580e9fa65467
SHA17311a066be36f2fc4ecd1a2c86babba65cd448e2
SHA2567fca9ecd72fc4816c4177225f7651378ed405aaf490a5dcb224a3fa74fd07eba
SHA512b7dda0ef69d1a25c362152c4ffe80fa7bd62dd9322c685885b3a2b7618c7289bd3dfed5baf671f7cabb2f1c638322b55cf65d95203d68903bc9ff5aa2699eaee
-
Filesize
517B
MD5756ed168ecd4a8e7813495bf13269607
SHA101c1b9eb82548a8c93064b56f1b2ed19d7422e99
SHA25608d389c66c0f96145bbcbd3401e644335d5d60403b7c2621437b32cd51833ee7
SHA512931c7624099d3ca72549cc30d3aa2b2c81ffb73ac18ebebd8c72c870960c72681e329a140ffeb83a9c71daef847c3993685ce2d399f939da09659e0d03dc8da4
-
Filesize
6KB
MD5cd3fad06daa62f7b104b423621161066
SHA1301750dc8eb629d4bf08783fe09738e3a6bcab7c
SHA2568ac82f412b0a51656f398d9fdf79bef902bbd7972c3b7f5a305b7c2316a59668
SHA5127249c4f01ae08e123a67f487ed4d9ebc08ed4b8ced3d1b7d15ef9156327ad54d2edcb64990a131c734433f35d28aa76dfb6203c32131da55a959b197b23b35bc
-
Filesize
6KB
MD56130f1f88f0d737d849cf6ef231e8efd
SHA1263641b18b256b29a135409b31776f7e8d2dec64
SHA2564389388c436b73cdd49399f38fff57a48b5cacb248b5a35d82de6c51b5429a79
SHA512c3366b1b71b63c51f1c6c3ed758d967534fdd108d8d9ecbf10d815cb3144a173e953991d289848cf961c4d463750dc4b55c50c55763213150b3599d56ef339e1
-
Filesize
201B
MD5318b5ad91461a427984cff0d10c8e87d
SHA16462418c6c69948fa95638baea4787980dcb6a5d
SHA2567e313198ec351d8616d9d62957cdd9768083f2e7c0599cae193d6bc207720e5d
SHA512c0a19130431cb017d1f87ed07f4d026b0fe10ccf1e8b1d38aa8797eea2cda2edabf65d02aecc3fa27ce5bb4a0a859431ef883af1d32c2cd8faf6c31a36bd2e69
-
Filesize
203B
MD52170ce6e6af7947ebba592056fc7efec
SHA1abec14553bb4532b284cd99c4fb97b5eb45c0201
SHA2569c9c78c38b6b6b71cd7533d263e393eb24356fcf4f2ae5a6083326ed52b7e305
SHA512e0af4a8f6053afedfd14a2cd3e30f4412fedf52fb9a0c4d62bdad0ae917074216799d6901ea4349170d1fe30384183ba6038d068e557966b0c36281153f6b2f6
-
Filesize
11KB
MD5f48e033b2edd5457eef44e984f7af019
SHA1a65945ff87c014e947eeb961d1312e056869256e
SHA256ab6d8d7d968192aa857bbec73cea8d7a1bc7c3651da97efa2476e0af775257aa
SHA51249b782331db0f95d8bd554154e67840300bf0b672c51fe54eeb045aa20fdc0b5e7771c97e2b4bd466ed9c3634d8dd466f64af4cb2631dadda29d1181234bcf30