Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
40dcba2970e9fa640fc9ac5100c63a1c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40dcba2970e9fa640fc9ac5100c63a1c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
40dcba2970e9fa640fc9ac5100c63a1c_JaffaCakes118.html
-
Size
140KB
-
MD5
40dcba2970e9fa640fc9ac5100c63a1c
-
SHA1
d8525fe03377d1288d05d4417e508113bc5ca1be
-
SHA256
1acb282dab2e058e72564d7fad45182cd30abeafdb226f3d6cfd467587b1916d
-
SHA512
dab1c4bec9775fbd1054db247f3dcb83bd4596a2c18f0f08551b22d7d7c3848a4f96abd24d6355970b99d808c392bb725d73d26e83dd21a67f52cb131593c2dc
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcESDtHA2g2L6WogycZxQc+4p:sULLLZyY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1216 msedge.exe 1216 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3064 1216 msedge.exe 83 PID 1216 wrote to memory of 3064 1216 msedge.exe 83 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 4800 1216 msedge.exe 84 PID 1216 wrote to memory of 1480 1216 msedge.exe 85 PID 1216 wrote to memory of 1480 1216 msedge.exe 85 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86 PID 1216 wrote to memory of 4068 1216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40dcba2970e9fa640fc9ac5100c63a1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9531446f8,0x7ff953144708,0x7ff9531447182⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10188453996106433001,5098306863818286614,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10188453996106433001,5098306863818286614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10188453996106433001,5098306863818286614,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10188453996106433001,5098306863818286614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10188453996106433001,5098306863818286614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10188453996106433001,5098306863818286614,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
6KB
MD543ec8589331dda1fe313fe9d64701a47
SHA13eb8a1e8b5a8f7d075042a78d0a8f43537ace6e5
SHA256cd98174dd5a187fd26bf23949bf3a2c7167a21286fff46825d7124c52d51cff6
SHA51224a5848d431c12ec1dbc87d5fbcd5a33d6f4b9be87d86a65b9fe0199485939338fb3036dbf05b9b4280eac00d6b14b24f336ea516dd01abef4107f7a2fa378e4
-
Filesize
6KB
MD51ccad88d6d85d2cb8fa7ac116f44a9e6
SHA1f3f937bd995a8dfab324eccb4c1dbe84eec9f28f
SHA2566f0bdaf9f49e03371d907c9a030b40b23f5aec871d6973376da813514e7804e6
SHA512b91f173d8eeea1df087fc368c6b3ba46092dbc9131b84c3e45485b58addd42b6cef052e2d9ac30444f39d06da1333ce05191f0abb6c317a9afc1d2d7115fef1e
-
Filesize
11KB
MD5b64608d366cac965c5b98a6cef6c6bad
SHA1ddbf28583fc879205918c8d25e9f43d3ec8fc2fb
SHA256d43cfc854c365f7da13812a38c40ed5020a19933ce82d8f4a66fd621c9134deb
SHA512c61cff92cd2ed501e61fa7ce4c5ad19380ec9d4db7e5da92cf51aca910b5af2c094222bb93405890c1013e0d54d158d3203f7e10c2b9fe3004b5e6fe0694a129