Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
36629ca60dab38cf006c09dfff7e565c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36629ca60dab38cf006c09dfff7e565c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
36629ca60dab38cf006c09dfff7e565c_JaffaCakes118.html
-
Size
137KB
-
MD5
36629ca60dab38cf006c09dfff7e565c
-
SHA1
6d634423c94f067c124f63b731ae64c3cfa3d84c
-
SHA256
2dcaa8dc1b043afa79e8bae0cef3be19494dc8dd2e799c0c5c2293979bb4a540
-
SHA512
49f5d65fca5c93e88f33829b89f0bb189699678f3a1ace1c5f8285fe19b03abdd06398131e8458792a0ba082c55e78d51423ef858d26cc45f55a961886102ad5
-
SSDEEP
1536:SOZUmAFyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:SO2LyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3348 msedge.exe 3348 msedge.exe 640 msedge.exe 640 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 640 msedge.exe 640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 640 wrote to memory of 2700 640 msedge.exe msedge.exe PID 640 wrote to memory of 2700 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 552 640 msedge.exe msedge.exe PID 640 wrote to memory of 3348 640 msedge.exe msedge.exe PID 640 wrote to memory of 3348 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe PID 640 wrote to memory of 948 640 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\36629ca60dab38cf006c09dfff7e565c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb39f146f8,0x7ffb39f14708,0x7ffb39f147182⤵PID:2700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16932792158022580583,883999849313932279,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16932792158022580583,883999849313932279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16932792158022580583,883999849313932279,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16932792158022580583,883999849313932279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16932792158022580583,883999849313932279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16932792158022580583,883999849313932279,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
6KB
MD565aa548469bbe5d5a11aeacbb8bdead9
SHA13072acece97419d87856647ae82d70e07556ec96
SHA2569ddead944d1a135fd3583f73d8c865769cde915a4944fd7f0a5253543aa90964
SHA5120cf2b239663a36a408f14c1e0732012878a8d7297c58309a44a5c36b0e10e845bdb5ee5a963d3ec9dab4e24873eb861607da41297b4dd92d099f6ed4594a2f58
-
Filesize
6KB
MD5ec09230322df7e25d183ca264477d450
SHA1462bf200a78fd72d35ab60f099f0f21b963282de
SHA256d5130788d2a55800b58ffd0d0ebb71d512159614bf9fb415a230bb5a97df50bc
SHA512a1fb27d61fd817583b996ed7a06b97652f3738966a9275b53e731763d72892cc60c8d078aaf4fe3f04fb62b90a0c4d561711ef4b4180b6d20c72d9e8959284ca
-
Filesize
11KB
MD59c52a9ef6eeb5b1f26c29e2bb7b31bde
SHA1fe3816bd8c4e0d6ef4429207d7d22be16c7ac6d5
SHA25667b825629cccf02841f077a500ba3e3b0f610a9d33161419b91011e8993baa0e
SHA512ac78e09b16d86be9ee8bf32c786d21fda09e9cbee6dbfb2379fd9646427f5a9dc653e0c9f8d36964c6fd6ab7199687edaecfa474056514975342b94830b98f4a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e