Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
468066df6fbc85c6aa78bde96b4d23b5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
468066df6fbc85c6aa78bde96b4d23b5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
468066df6fbc85c6aa78bde96b4d23b5_JaffaCakes118.html
-
Size
109KB
-
MD5
468066df6fbc85c6aa78bde96b4d23b5
-
SHA1
c4cdbe1ae2c85ba93f5becdae2be0609f5747193
-
SHA256
58a849805bb3871ec4478c1913b06b6988f75bf4d3ef01aed1ffdf1d59689d31
-
SHA512
dfd6be55c9db03cff7095f3254f280cf967e3089143b62a9d37ad23b46763e6b344bd2a2b622071bf819aa28e169f2996cf4139c707bd7132216bf685dbfbc0f
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcp95HAznzLkUKCcZvmSkCp:sWCzLj+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 3308 msedge.exe 3308 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 404 3308 msedge.exe 83 PID 3308 wrote to memory of 404 3308 msedge.exe 83 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 3024 3308 msedge.exe 84 PID 3308 wrote to memory of 5116 3308 msedge.exe 85 PID 3308 wrote to memory of 5116 3308 msedge.exe 85 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86 PID 3308 wrote to memory of 1652 3308 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\468066df6fbc85c6aa78bde96b4d23b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce65546f8,0x7ffce6554708,0x7ffce65547182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,18396859551834498978,5619711711622586054,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,18396859551834498978,5619711711622586054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,18396859551834498978,5619711711622586054,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18396859551834498978,5619711711622586054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18396859551834498978,5619711711622586054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,18396859551834498978,5619711711622586054,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD5ee5d9ed0d53e6ad4514dba3c7481cb72
SHA16d42708d699ca70df491df8fc980b02b0b566239
SHA25665625a31683c7577512c5d455e05d1c44300eda48bc56376869e28157f8005ca
SHA51265b5b7ca41ed6ce3c65d3218963731ec62af9df1a4a9902fc9c64eb9ad979bd3985fc3e628f77495eeddd012372fe25f8370cb79ec728b4991c88e13f8f9a520
-
Filesize
6KB
MD55ad02bbc78bf12ead693252eb6eec646
SHA1df10c15ea5ab899e0933ff7312cc47cc9b9748ae
SHA256537e182ebe14b2049969002484c282d65b0be258e9d3d97dd4d6b27ab4647d29
SHA5126ef80a3b5d7aa1cf68389d00eddcad9ee439bec6dd2ced78ef887efc40139b889d036af08fe6c5cc355b4301ead3d583ed11b1bd7f42f779d194794972122f0e
-
Filesize
11KB
MD5953ec763c954feefdd870dde2c40306d
SHA124afd55a8138045b72b4da651a9b7918bca3ff27
SHA256157fa5c8378bfe9f126c4db1f815d304656e3c8379d9eba1e1b633186b6800f9
SHA5121103271d9e7bb30e4d1f077ca018cd044a4aa57b92a4db95cdf4f5c862c6389afdbb6a3a64212a8187d3a74213038cb3d2506a0b490b227ed10007be3f61c715