Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
2870c5200e543902a46c0ae4c53d973a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2870c5200e543902a46c0ae4c53d973a_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2870c5200e543902a46c0ae4c53d973a_JaffaCakes118.html
-
Size
365KB
-
MD5
2870c5200e543902a46c0ae4c53d973a
-
SHA1
5eb67103d22dfb89796ab301653b89ac033d4dd6
-
SHA256
2f22b5110fc385b40773270a5fa52a51cab896511875ce893965bdfa48ad1f7b
-
SHA512
af785c38bf60d78c28dab5d103823714399e57fd577d81aba51305d2341ed4d423de2288c934f4a17b67baa77fabf782580c60d8569a140ce298da598f291f36
-
SSDEEP
6144:aOLGPS+sMYod+X3oI+Y26gpW2sMYod+X3oI+Y26gp0:aOLGP75d+X3zC55d+X3zC0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 1452 msedge.exe 1452 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2228 1452 msedge.exe 82 PID 1452 wrote to memory of 2228 1452 msedge.exe 82 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4748 1452 msedge.exe 83 PID 1452 wrote to memory of 4872 1452 msedge.exe 84 PID 1452 wrote to memory of 4872 1452 msedge.exe 84 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85 PID 1452 wrote to memory of 3548 1452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2870c5200e543902a46c0ae4c53d973a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe31cd46f8,0x7ffe31cd4708,0x7ffe31cd47182⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15570253531046259138,14082168127915320286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15570253531046259138,14082168127915320286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15570253531046259138,14082168127915320286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15570253531046259138,14082168127915320286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15570253531046259138,14082168127915320286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15570253531046259138,14082168127915320286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a27d8876d0de41d0d8ddfdc4f6fd4b15
SHA111f126f8b8bb7b63217f3525c20080f9e969eff3
SHA256d32983bba248ff7a82cc936342414b06686608013d84ec5c75614e06a9685cfe
SHA5128298c2435729f5f34bba5b82f31777c07f830076dd7087f07aab4337e679251dc2cfe276aa89a0131755fe946f05e6061ef9080e0fbe120e6c88cf9f3265689c
-
Filesize
152B
MD5f060e9a30a0dde4f5e3e80ae94cc7e8e
SHA13c0cc8c3a62c00d7210bb2c8f3748aec89009d17
SHA256c0e69c9f7453ef905de11f65d69b66cf8a5a2d8e42b7f296fa8dfde5c25abc79
SHA512af97b8775922a2689d391d75defff3afe92842b8ab0bba5ddaa66351f633da83f160522aa39f6c243cb5e8ea543000f06939318bc52cb535103afc6c33e16bc6
-
Filesize
6KB
MD575f93d78ee306a668e7c80bb30a64fbb
SHA172d871f1069d2d996ca77e83692bf32403052d1e
SHA256e2b1dd2b8e6226fee1f3aa493527019cc240865e61eeb02498d42fd789e5227b
SHA512b364b383976d421cee022fa230bdeb5932e29e78010bdfb9303c60df5faba1280f41fac9d91ed8af05f325e873ddfced36abc8038ecfbe2f8804f13886ee1e9d
-
Filesize
6KB
MD5826846e106076d2e84c1f6cd5fe75b40
SHA10bc75b63520c96f3deaae8e0886e3b6d4e1eeb47
SHA25674ecd0e0466af43c43df041fb2049d23a877b2affde4e1ed3966d2d9b2eac07e
SHA512fbc0415f8f5c4ed1ea63fb6cfaa88d386633a97d2ade70592adb35e3b642352df4a92f82b14b02aed7d32a08dd61cc771c7736e09dfedb34602bfd959af70499
-
Filesize
11KB
MD597b3661610b89f2f5529a06c18dc1153
SHA189dfa93db44e056905dfb661ed9fb74d05b5302b
SHA25604b5bd409febf8023831d92386c4799ac1d85d7bdf8b2d805adfffd3b8835863
SHA512568e419ed37020de606c5e09dc26477940cb6622a7f6af574bc3adaae0f3cdaf62b2aa7e14216ed30907b4d3383cad930c5bd5403587f25a5a267cce66a88f57