Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
b1d5248be4370c1fd81058d395b75e7c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b1d5248be4370c1fd81058d395b75e7c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b1d5248be4370c1fd81058d395b75e7c_JaffaCakes118.html
-
Size
139KB
-
MD5
b1d5248be4370c1fd81058d395b75e7c
-
SHA1
50408e0063563b39ff0a25ad8caaee2b3fafa06f
-
SHA256
e98e0ba91aac2a3889576e95c682f909be2078afd2489e36b8125b7be6d7797f
-
SHA512
fd3cc89721526e4c02a0275637b1df96c8a84485508c9bb4cfd07b2abfa631567ce266b31284e27c7051fbc5d8612976280bf357f5d5ed5ac2f516832e4b9a52
-
SSDEEP
1536:S89MwClpyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:S8DqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 3948 msedge.exe 3948 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 1008 3948 msedge.exe 81 PID 3948 wrote to memory of 1008 3948 msedge.exe 81 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 2708 3948 msedge.exe 82 PID 3948 wrote to memory of 1444 3948 msedge.exe 83 PID 3948 wrote to memory of 1444 3948 msedge.exe 83 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84 PID 3948 wrote to memory of 3636 3948 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b1d5248be4370c1fd81058d395b75e7c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe808046f8,0x7ffe80804708,0x7ffe808047182⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7067705449316320438,2978412818865383470,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7067705449316320438,2978412818865383470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7067705449316320438,2978412818865383470,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7067705449316320438,2978412818865383470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7067705449316320438,2978412818865383470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7067705449316320438,2978412818865383470,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD51c399acf62ebad543aec7e28f49bcb49
SHA172e89959cc0098333122c0918b6e9ae05fa54864
SHA256170d5d596966c63113fb0b005d4e19a071759bb5b99dabfb6a65c638678120e7
SHA51210fbf6e400c22fb6b889948f3a12bc12e5c1573cac6f7b1468feba94587d03fca934adb2490d14dd3758dbdc5fe1e242e5b751bc22ceabd922a264ed9a9e9616
-
Filesize
6KB
MD58a791b50b91ceb76fa20e698b5a2935f
SHA1562d0ff946fd205a0969726881d4f6eb983eb43a
SHA256269474ea75545099429623990616552a93336a004348e52ce3e4cdef2bfd6ad5
SHA5126e2cac7ea2883ff70a365d884db52978402da079c5a1b1a0b04f542ac821279ddc1c520fc884d4e91f99edb3d5cb42bc33a1a7c6f77be7ac239b96c8f4efc360
-
Filesize
11KB
MD592b846bb29996f91f97899a86ef7899f
SHA16b42d37ace78a1ed2c8d28fee1525b7f4a95d514
SHA2567458bfd1f006e74e606e40b92c238dfb017366f8a45b57fcbb6c7bc475be3e83
SHA5127c1e79f67914ea61ed9d0ef788e4d26159980ca2748104f767fa8ab80b06146e325c1df77096381f98479310fc536edecb55ce898b3479b4ec2828ab09101df3