Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
43429f3e05b8e81fc591c0d55f960f1e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43429f3e05b8e81fc591c0d55f960f1e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
43429f3e05b8e81fc591c0d55f960f1e_JaffaCakes118.html
-
Size
165KB
-
MD5
43429f3e05b8e81fc591c0d55f960f1e
-
SHA1
ea4276f7113947e31f010d07db77fbdd975c668b
-
SHA256
e44d2afa82c13e5b7e3f6917b89449743d78406c5ed7fa60344d9b5731c16678
-
SHA512
4e9c34d46dc58b0718493026b551ec19407c93ae9b220fb33c43537ac4a3a13dc81dfbfff36aaedc8f0d6da10a995ff27ca2df174ce69e2c58509daa97201dd4
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcm2tHAse8L5LHt8qcZ6dd1rp:syFHLDPL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 4348 msedge.exe 4348 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4460 4348 msedge.exe 83 PID 4348 wrote to memory of 4460 4348 msedge.exe 83 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 3608 4348 msedge.exe 84 PID 4348 wrote to memory of 4100 4348 msedge.exe 85 PID 4348 wrote to memory of 4100 4348 msedge.exe 85 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86 PID 4348 wrote to memory of 1396 4348 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43429f3e05b8e81fc591c0d55f960f1e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacc6446f8,0x7ffacc644708,0x7ffacc6447182⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9010505754048285884,16513655324055646893,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9010505754048285884,16513655324055646893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9010505754048285884,16513655324055646893,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9010505754048285884,16513655324055646893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9010505754048285884,16513655324055646893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9010505754048285884,16513655324055646893,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\967a8f70-d02a-414b-bb30-5029d7b2e3c7.tmp
Filesize6KB
MD53c9878b054bcb4811615292d84781660
SHA139b0265af4cfa967afc78888e3809a71cedd5b92
SHA25647f908874f256c83050284940d3431f14f91881c263fdd5a6b264d2e851fde5f
SHA512afdb4153ddb5c77ed1c32f006ad4c3695f557176b103617bb97f740368511e65d6cd41991e10871bce2c31d6b37791b762f0a1cefb097328ec0ff6ef59876c20
-
Filesize
6KB
MD515331a0ded8be72603b8858b121aa5e5
SHA195f61f5074c9a3e49310b4b29da14a2ab3a2c9cf
SHA2565230bd474071981da41021e8f9e4ae63d6cbe1ce2d7c3012f48e992b4f2686bd
SHA5127035af54304667207b52340376b2c44b88ec8f4144d2a97d2f4164e34e0bcb1ec31aa827176723b9eb451a2a3a50f28fd398dd07910537142eebed7d6f94c588
-
Filesize
11KB
MD5958d8ad4793fb44bb35b4c60064d9d6e
SHA1cd853f4718139affc40dbed85ceca1d3a0b6a9ed
SHA2569b6f4aefc1b5720dbd6166cdd605d3258b744c4c534f83a32802cf89e66a839d
SHA512e2dd527b3ffba59e3982ede8106fcd3c9a1f7bab8f63dd6fb68a38173e71409f2b2907c71f6bb136d37cbb4ebbb93216654d36564feb6740c4bec6060b12f39b