Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
298f0b11b5f6b748edea3b12793fd40b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
298f0b11b5f6b748edea3b12793fd40b_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
298f0b11b5f6b748edea3b12793fd40b_JaffaCakes118.html
-
Size
123KB
-
MD5
298f0b11b5f6b748edea3b12793fd40b
-
SHA1
121f5b464cf1991e0d4a6e287e790148fc2bd1c2
-
SHA256
5d95021f92ebfd5816a95cbbf48671ef88d65e137ab59aa65238c0a752a3563a
-
SHA512
e5718de1012eeaaacfac5ab65dde9e0fee7c529b5de4c2443dd3f84ddb054c9f76fb7044fcced1093861d245819c399cddc387f86302ce1a86db5177ecec8afa
-
SSDEEP
768:gxYA9jBWIghvjwW/kNv8cnONWnoaiAQoY2ZracBlsuk0nM+Eqx3nXBkkvpsz7tt0:gpNBX2kN08OEnoAnraSMeUW3nmzH0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 1140 msedge.exe 1140 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4348 1140 msedge.exe 82 PID 1140 wrote to memory of 4348 1140 msedge.exe 82 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 2096 1140 msedge.exe 83 PID 1140 wrote to memory of 4484 1140 msedge.exe 84 PID 1140 wrote to memory of 4484 1140 msedge.exe 84 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85 PID 1140 wrote to memory of 4444 1140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\298f0b11b5f6b748edea3b12793fd40b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe201746f8,0x7ffe20174708,0x7ffe201747182⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9854977608917848968,2497516711734263798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
6KB
MD5babc4b16e472e567ef7e6b5fdf9e4f3d
SHA1ac56b65f79cd97c6652295a2801cc124c65de9af
SHA25620d593d15aa7955f834de457946ea3753d1aaf6727efe7384a25def612d4b330
SHA5121ea757a377fe9ccaa9c0bb95504a94309791bfe05bdc543a703749e447dec2046970c93bfa680f55f4fb3a2ff3ed62872672dd7f4eab8a629b65b0afb8c95af8
-
Filesize
6KB
MD584c80c77dbaf8c4d1f3b36901b52a851
SHA1d1444cf865ca8d4caa68f6c626069ed99ae06b9b
SHA256f0e31516194eaa40f9b6271a8c4f29d8f69f349fd41c6e11d718af66011f0d9f
SHA512c61a8a41f135f249844bd236686d4472cb19aa1a59fff4fb3c2f70a40e996d7d1c6fcaed62f93513f6da795e54091a7a2ed5f2c436718226b91321ffab680d6e
-
Filesize
11KB
MD58da234c38937571cb87778388a75fecf
SHA156ebfc570e9d19e799fd039da3a46d152ef44c6c
SHA256743ce8c4b3dbd5f7278db2fdb0e615def834b45d37655518f99e53038fa8133f
SHA5127111cde51483e12e17f3c277c0fa2bb15521b57325c10852cd239e9fd0069cf5d596f77f49fac4cb49a39b7bee61c539be5ff2d000d5b464ce868fcbd3318415