Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html
-
Size
123KB
-
MD5
40dd66829930c2f7db0d038dc9865aae
-
SHA1
5e9e44d7ebf885974b3a92280b52faa519dea07d
-
SHA256
6200bcd971475baea9246f3c501632d07923b039651bc93b2292c9844ecf60c1
-
SHA512
3a34fe9b1e17ff076249330030374094e31d66bfbfa4c726f2497da8d221e67402fe51fc054794ef0f464afe3fb33fb628210b1e51c9b2d58295452d38f0d30a
-
SSDEEP
768:dx1vPea/kTAUkDvCyGxZv53Gnq/ziMxH4C4Dg9lOBRIq+VV+wYGh6R5ATR6tQ/q4:dLuaWY6DZX/ziMxH8DgbI/wkR5Astwq4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 984 msedge.exe 984 msedge.exe 3008 msedge.exe 3008 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3472 3008 msedge.exe 83 PID 3008 wrote to memory of 3472 3008 msedge.exe 83 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 2872 3008 msedge.exe 84 PID 3008 wrote to memory of 984 3008 msedge.exe 85 PID 3008 wrote to memory of 984 3008 msedge.exe 85 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86 PID 3008 wrote to memory of 1632 3008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0d1146f8,0x7ffc0d114708,0x7ffc0d1147182⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16418696292152117665,12901833897562787514,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
6KB
MD588f247155668666e35ab423dff6c76d3
SHA166a60a109bf7600b59e30d246391c6425de3306e
SHA25690f77d58c17c3ca54b4f68db437b0dec70c42220f606b6c142c872ef879d15e3
SHA512927f5f68d182f0d906c71e62fa125ced406587b02260be02134c9a7d32c1481ed94c833d29010c209babb95ece377fbd7f44e8e3b638f2bf53724b222acc0034
-
Filesize
6KB
MD52f3c10d067a88b0e6efebcbfa040426b
SHA18df83f567b16afa93c835e2c895647a6ebbb0894
SHA25633ef9d46e89f22111b8dc4dacc7010a5420b1e0c5ee386f604b037ac5a39286b
SHA5120ee9d19c5194d130f50b5e8f129a72fba6fd311bd21e526624e61d7f6bbecbf2be525d797e6793435d41ef827ecb2e6d81ba77fbc88a824ed5f01017d20582ae
-
Filesize
11KB
MD5545b1fc6a1797282abd36704d678d5c4
SHA1f7103dc14c99f5f72ae3d6141cc190e68fbec63f
SHA256914bf166fc8a8d1af16fab249caa11f0c676352faa28ebbf78950ff18c7e719c
SHA512d50e72d8b193f189279cfc649998c26f298135082d515b45ee2d18ae010617a873417a64bb4603fd9e2ff3d3513604f11df327c49c9d62b8a16d22550b7bb574