Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
311d00e8772e586873ce4be93aeb75c0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
311d00e8772e586873ce4be93aeb75c0_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
311d00e8772e586873ce4be93aeb75c0_JaffaCakes118.html
-
Size
120KB
-
MD5
311d00e8772e586873ce4be93aeb75c0
-
SHA1
17c568ff14344f0c76e40897697cb6fbecf22f8b
-
SHA256
302916a8f2dbbd4e81cd9ad871a4821e54895c0c97b669aaecf174992b4b204c
-
SHA512
cea488d32006f16ef55f75c086c173eb47eaabdc8cb05cb3d8898d336a6038b93760a595a03384f5732eeefd95f335577b90cb4639de30f6d96c0182da287c4a
-
SSDEEP
1536:5Nbvmjg6/sAamQLyHfXRv3huPZPiAQFZheZu5NWp57:2jgvAJdhuBPiDjyuiD7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2348 msedge.exe 2348 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 696 2348 msedge.exe 82 PID 2348 wrote to memory of 696 2348 msedge.exe 82 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 1012 2348 msedge.exe 84 PID 2348 wrote to memory of 2392 2348 msedge.exe 85 PID 2348 wrote to memory of 2392 2348 msedge.exe 85 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86 PID 2348 wrote to memory of 4092 2348 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\311d00e8772e586873ce4be93aeb75c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86cef46f8,0x7ff86cef4708,0x7ff86cef47182⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,16893032954838167107,3043331687902702509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f0f818d52a59eb6cf9c4dd2a1c844df9
SHA126afc4b28c0287274624690bd5bd4786cfe11d16
SHA25658c0beea55fecbeded2d2c593473149214df818be1e4e4a28c97171dc8179d61
SHA5127e8a1d3a6c8c9b0f1ac497e509e9edbe9e121df1df0147ce4421b8cf526ad238bd146868e177f9ce02e2d8f99cf7bb9ce7db4a582d487bbc921945211a977509
-
Filesize
152B
MD50331fa75ac7846bafcf885ea76d47447
SHA15a141ffda430e091153fefc4aa36317422ba28ae
SHA25664b4b2e791644fc04f164ecd13b8b9a3e62669896fb7907bf0a072bbeebaf74a
SHA512f8b960d38d73cf29ce17ea409ef6830cae99d7deafaf2ff59f8347120d81925ff16e38faaa0f7f4c39936472d05d1d131df2a8a383351f138c38afb21c1a60e2
-
Filesize
6KB
MD5b9caf88a2421624bd79b5fed50fca8b3
SHA10213dd0f481266b5c16d6d2ed612fa67539e5156
SHA25666d00b4a3e6e465d0e871e6b383b81d83e122c29742d43cda0a1696d628c7820
SHA512925886f15a8bd35d8b8943483961a7bd3723a1eb5e440e6c5087733fecde1ce37d0646272918d97765f3ac79dce6a0a54e79ba0db7705857e59d535e0b5ed7cc
-
Filesize
6KB
MD516e9a73164c5ea888232ca89faa1b7a6
SHA1ae074c9a2912e8b06342693962e0be0cb07e9dbf
SHA256bb381ab72c472f38246ebe56b6420bfa631027ce3cc5fdc6419e0d9dde42e863
SHA51220a249f0b9d2ff83a453138d894c459acf8f5dd1336877b049444daa9708bd8fc672308c3da857dc134fca5ef1a3c47badf43ab3ff88d52dc98de729b584e150
-
Filesize
11KB
MD5780a7ddd62fb07031dbc850f66e85c6d
SHA1faeba3c46e67ca577a9a52e49d7f5d67a299cdc4
SHA25635ac76caceb49389ca748b06805f6b752c0771f7676ac3295aa07b062ba41674
SHA5128c5d308cf08f951c64929b7fc338d17336b52b4eaf8075742aaa158d5357f30a716da638360eb5e99ab313edc3e9280124c8c8b6fc7e94b4181945299422ee6b